I'm doing a VHDL program in Vivado, using a zyboz7 20, which would have 2 teams, each of them with different buttons and led lights. The idea is to use one button to obtain when a team scores a goal, so it will be displayed in the 7 segment-display (for example, if the button is pressed once, the display will show a one, and so on). When any of the team gets to 3, the led light given to that team will turn on.

Right now, I just have one team in the program and the constraints. Also, I have trouble understanding the debouncing of the button, I don't know if I'm using the wrong algorithm to attack the debounce issue, but it's as if the clock was delayed or it's not taking some of the input, I have been looking to a lot of tutorials but I can't find a way in which the programs can work without any issue. I will show my code here and the constraint, I will also explain the code so it will be easier to modify it if anyone can help me with the debounce issue.

Program's code:

library IEEE;
use IEEE.STD_LOGIC_1164.ALL;
use IEEE.STD_LOGIC_UNSIGNED.ALL;
use IEEE.NUMERIC_STD.ALL;

entity sevenSementDis is
Port (
C : out STD_LOGIC;
won1: out STD_LOGIC;
team1, clk,reset: in STD_LOGIC;
SevenSD: out STD_LOGIC_VECTOR (6 downto 0));

end sevenSementDis;

architecture Behavioral of sevenSementDis is

type statetype is (Init,Gol,AnotherGol,victory);
signal state, nextstate: statetype;

signal clk_bit : INTEGER := 4;
signal clk_bit2 : INTEGER := 4;
signal count : STD_LOGIC_VECTOR (4 downto 0) := "00000";
signal clk_div : STD_LOGIC_VECTOR (4 downto 0) := "00000";
signal count_reset : STD_LOGIC_VECTOR (4 downto 0) := "00000";
signal clk_reset : STD_LOGIC_VECTOR (4 downto 0) := "00000";

begin
C<='0';

process (clk)
begin
if (clk='1' and team1='1') then
clk_div <= clk_div + '1';
end if;
end process;

process (clk_div)
begin
if (clk='1' and clk_div(clk_bit) = '1') then
count <= count + '1';
end if;
end process;

process(clk)
--variable Count : natural range 0 to 5 := 0;
begin

if rising_edge(clk) then

case(nextstate) is

when Init =>
SevenSD<="0111111";
won1<='0';
if count="00010" then
nextstate<=Gol;
else
nextstate<=Init;
end if;

when Gol =>
SevenSD<= "0000110";

if count="00011" then
nextstate<=AnotherGol;
else
nextstate<=Gol;
end if;

when AnotherGol =>
SevenSD<= "1001011";
if count="00100" then
nextstate<=victory;
else
nextstate<=AnotherGol;
end if;

when victory =>
SevenSD<= "1001111";
won1<= '1';


end case;
end if;
end process;

end Behavioral;

Explanation:

The ports: Won1 is the led light assigned to team 1. team1 is the button that I want to use when team 1 scores. The reset is also a button but I haven't been implemented. SevenSD is the 7-segment display. Clk is the clock and C is another led light that hasn't been implemented.

There are 4 states, Init(where the code starts), Gol (the team scores the first goal, which would also change the display), AnotherGol(team scores again and the display changes), and Victory (the display changes one last time and led light turns on). There are also state (which would take the actual state) and nextstate(which will tell the next state).

count is an integer that will be added when the button is 1 and the clk_div is also 1, it's the one that determines when to move to the next state. clk_bit is just the bits of the clock. clk_div is diving the clock to try to attack the debouncing issue. clk_bit2, count_reset,clk_reset are not implemented, they were created when trying to add the reset button, but when I erase them, the code just stops working at all.

the rest are some process to fight the debounce and the last one is the actual code, which goes around the different states until the victory state.

Answers

Answer 1

Answer:

como lo echo es echo si no tengo un pájaro es

Explanation:

un pájaro azul


Related Questions

Two adults and two children are on the left side of the river. They all want to cross to the right side of the river. However, the only means of transportation they can use is a boat (also initially on the left bank) which can carry either just one adult or one adult and one child or just one child or two children from one bank to the other bank. Any adult or child can operate the boat, but the boat cannot be operated without having at least one person on the boat. The goal is to come up with a plan for moving everyone from the left side to the right side using multiple boat trips. Describe the initial state and the goal, using PDDL. Define appropriate actions for this planning problem, in the PDDL language. For each action, provide a name, arguments, preconditions, and effects.

Answers

A plan to move both the adults and two children from the left side of the river to its right side by using multiple boat trips is described through PDDL below.

What is AI?

AI is an abbreviation for Artificial Intelligence and it can be defined as a subfield in computer science that deals with the use of advanced computer algorithms and technology to develop an intelligent, smart computer-controlled robot with the abilities to proffer solutions to very complex problems.

What is PDDL?

PDDL is an abbreviation for Planning Domain Definition Language and it can be defined as a group of programming languages which are designed and developed to avail an end user the ability to define a planning problem.

A plan to move both the adults and two children from the left side of the river to its right side by using multiple boat trips is described through PDDL as follows:

(adult1 Adult)

(adult2 Adult)

(child1 Child)

(child2 Child)

(boat Boat)

(preconditions

       (left adult1) (left adult2) (left child1) (left child2) (left boat))

(effects

       (right adult1) (right adult2) (right child1) (right child1) (right boat))

For each action, a name, preconditions, arguments, and effects are provided as follows:

(operator

       travel-adult

       (parameters

       (<adult> Adult) (<boat> Boat))

   (preconditions

       (left <adult>) (left <boat>))

   (effects

       (right <adult>) (right<boat>) (del left <adult>) (del left <boat>)))

(operator

   travel-child-right

   (parameters

       (<child1> Child) (<child2> Child) (<boat> Boat))

   (preconditions

       (left <child1>) (left <child2>) (left <boat>))

   (effects

       (right <child1>) (right <child2>) (right <boat>) (del left <child2>) (del left <child2>)

(del left <boat>)))

(operator

   travel-child-left

   (parameters

       (<child1> Child) (boat Boat))

   (preconditions

       (right <child1>) (right <boat>))

   (effects

       (left <child1>) (left <boat>) (del right <child1>) (del right <boat>)))

By using a Planning Domain Definition Language (PDDL), the initial state and goal state are specified as follows:

Initial State: left(child1), left(child2), left(adult1), left(adult2) and left(boat).Goal State: right(child1), right(child2), right(adult1), right(adult2) and right(boat).

Read more on PDDL here: https://brainly.com/question/15993488

#SPJ1

two types of storage memory​

Answers

Answer:

Primary and Secondary memory

Primary memory includes ROM and RAM

Secondary memory includes CD, hard drive, etc

what is a mini computer ? write the use of mini computer ? Please help me​

Answers

= Mini computer are medium sized computer that is smaller than other computer and powerful than micro computer.

The use of mini computer are.

= Scientific and engineering computation

= Business transactions processing

= File handling

= Databace management

I HOPE IT HELP YOU

what is the key differentiator of conversational Artificial Inelligence?

Answers

The  key differentiator of conversational Artificial Intelligence  is Natural Language Understanding.

What is Natural Language Understanding?

This is known to be the key differentiator in terms of conversational AI from traditional ones and it is one that is often  to help or bring about natural conversations.

Note that The  key differentiator of conversational Artificial Intelligence  is Natural Language Understanding.

Learn more about Artificial Intelligence from

https://brainly.com/question/25523571

#SPJ1

What does the term "classical computer" refer to?

Answers

Classical computing is another name for binary computing. In this traditional approach to computing, information is stored in bits that are represented logically by either a 0 (off) or a 1 (on). Today's processors, including x86 and ARM processors, support classical computing.

TQ Automation
What is Robotic Process Automation (RPA)?

Answers

Answer:

RPA or Robotic Process Automation allows organizations to automate tasks which human beings were doing across any applications and systems. The purpose of RPA is to transfer the execution of the process from humans to robots.

You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report needs to be filed. What should you do? Write a two-page paper specifying who in your company you need to talk to first and what evidence must be turned over to the police.

Answers

The email specifying who in your company you need to talk to first and what evidence must be turned over to the police is written below.

The manager,

Robotics Plc.

Dear sir,

Issue of  internal policy violation

I wish to bring to your notice an issue of concern that has occurred in the company. All employees are mandated to work for the growth of the company and when things or due protocol are not being followed, it can bring an organization down.

I wish to bring to your notice an issue of  internal policy violation  that was done by Mr. Yusuf Thomas on December 2021 that has cost the company to loss about 2million dollars. He used the companies money and also took some of the companies client for himself.

He is still working and no sanction or steps have been taken to reprimand him. I wish that the issue be solved so that others will not follow the same steps.

Thanks and waiting for quick response.

Mary Gina.

Learn more about policy violation from

https://brainly.com/question/13198827

#SPJ1

Explain download as used in computing environment.

Answers

Explanation:

Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device. Download can refer to the general transfer of data or to transferring a specific file. It can also be called to download, DL or D/L.

please mark be brainliest

Write an algorithm and flowchart for finding the area of a rectangle

Answers

Hi! I don't have an answer but someone asked the exact same question and someone answered with both the algorithm and flowchart for the rectangle.

hope this helps!

https://brainly.in/question/15178855

What does a search engine on a computer maintain?

Answers

Answer:

The answer is below the explanation.

Explanation:

A search engine maintains the following processes in near real time: Web crawling. Indexing. Searching.

Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jackie noticed the computer was working slower than usual. When Jackie clicked on a web site that she needed to review, the computer would not take her to the designated website. Instead, the computer took her to an alternative site. Jackie soon noticed that even when she was working offline using a word processing software program, the computer was acting up. When she went to
the medical software, she could not bring up patient account information.

Answers

In the case above, her system have been hack because she was taken to an alternative site which is used by hackers to deceive people. Since she could not find the file, the best thing to do is to use an antivirus that can prevent the malicious software from invading her system or call a professional.

What is a system attack?

A cyber attack is known to be when a person attempt to get an unauthorized access to a computer and this is done as they try to alter, block, manipulate or steal the data that is seen within the systems.

In the case above, her system have been hack because she was taken to an alternative site which is used by hackers to deceive people. Since she could not find the file, the best thing to do is to use an antivirus that can prevent the malicious software from invading her system or call a professional.

Learn more about system attack from

https://brainly.com/question/26199042

#SPJ1

How does block chain support data privacy?

Answers

Answer:

Blockchain transactions allow users to control their data through private and public keys, allowing them to own it. Third-party intermediaries are not allowed to misuse and obtain data. If personal data are stored on the blockchain, owners of such data can control when and how a third party can access it.

Explanation:

hope it helps you

A computer that is not connected to a network is called a........​

Answers

Answer:

standalone computer

Explanation:

If your PC is not connected to a network, it is referred to as a standalone computer.

Hope this helped and have a good day

Consider an individual who wishes to ensure that their information remains secure and confidential, possibly to secure their personal and financial information. They are involved in communications via the internet and possibly posting information to websites. In terms of leaving evidence on the system what would be their key concerns?

Answers

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them.

What is system hack?

System hacking is a term that connote when a person or a computer user has a compromise between computer systems and software that tends to access the target computer and steal their information or others.

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them as well as their privacy been exposed.

Learn more about system hack from

https://brainly.com/question/13068599

#SPJ1

give two logics how a computer is better then man ​

Answers

Answer:

Remember facts precisely without error or difficulty recalling.Perform repeated operations/actions without getting tired, bored, hungry or sleepy.Numeric calculations.Play certain games: AlphaGo Zero: Learning from scratch | DeepMindDo as they are told (though sometimes too precisely).

Explanation:

Hope it helps!!!

I am trying to make a flowgorithm chart for a dogs name, age, weight and when their weight is less than 50 OR more than 100 its output is the dogs name. I also need to include a sentinel value to end the program. For some reason I cannot share my screen or upload a file of what I completed. I really want to get past this assignment as I have already been working on it for several days. PLEASE HELP

Answers

Answer:

i think it helps

Explanation:

sorry there was someone else rude as heck messaging and responding I couldn't see their screen name

what isig naame

oh okay

I have sent dm

i dont know your name there

Help please!, explain what is missing and what needs to be changed if anything.

Answers

Using the computer language in JAVA to write a function code that output numbers in reverse

Writting the code in JAVA:

import java.util.Scanner;

public class LabProgram {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       int[] userList = new int[20];

       int numElements;

       numElements = scnr.nextInt();

       for (int i = 0; i < numElements; ++i) {

           userList[i] = scnr.nextInt();

       }

       for (int i = numElements - 1; i >= 0; --i) {

           System.out.print(userList[i] + " ");

       }

       System.out.println();

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

You created a photo album with transitions and want to send it to friens

Answers

Answer:

do not cheat in your exam

Answer:

C.All the negative things the other person has said or done to you

Explanation:

how could this code be simplified?

Answers

The code to be simplified is not indicated but I will give you a general guide to simplifying Java codes.

How do you simplify Java Code?

At the top, declare and initialize your variables. Late declaration disrupts readability.Create specific functions that are modular. It is inefficient to have functions that attempt to "do it all". Make it a practice to name the function to correspond to the task.All duplications must be removed and rectifiedHaving comments provide a fantastic way to summarize the purpose of a code.Do not overuse recursion. Doing this makes it difficult to understand at a glance.If possible, do not use global variables. The local variable takes precedence over the global variable in JavaScript.

Learn more about Java code at;
https://brainly.com/question/18554491
#SPJ1

A process model can _____.

A document both as-is system and to-be system
B only be used in BPR situations
C only document to-be system
D only document as-is system​

Answers

Answer:

25&⁴⁸/⅘kindly⁶⁸/⁵⅞8⁹⁰/⁴⁵

The postmortem lesson learned step is the last in the incident response process. Why is the most important step in the process?

Answers

The most important step in the process of the learned step that came last in the incident response process is to know how this threat happened and how to prevent it in the future.

What is Post-Mortem?

This refers to the medical examination of a dead body, to determine the cause of death and other possible factors that can also help to solve a murder.

Hence, we can see that from the complete text, there was a learning process that was used to teach the incident response process and this was done to help in threat prevention.

Read more about post-mortem here:

https://brainly.com/question/21123962

#SPJ1

Using computers can lead to a number of physical safety issues. State and explain TWO(2) of these types of issues.​​​​​

Answers

The types of issues that is seen are:

Electrocution Fire Tripping over wires and others.

What is the physical safety about?

There are a lot of of physical safety issues that can come up from using ICT devices.

A fire outbreak can occur if there is an issue with the wiring of the computer system or when there is too much voltage supplied and this is therefore a type of physical safety issues in the computer room.

Note that Electrocution is said to be the death or bad injury that is known to be caused as a result of an electric shock from electric current that tends to pass through the body.

Hence, The types of issues that is seen are:

Electrocution Fire Tripping over wires and others.

Learn more about Electrocution from

https://brainly.com/question/1810934

#SPJ1

Write a function that creates a new string from a given string (as a function parameter) that consists of no digits. example get_not_digits (" Hi Mr. rober53. how are you today? today is 08.10.2019.", returns "Hi Mr. Rober. how are you today? today is.." lika a string. Help: check if the character is letter using isalpha method, and if it's digit use isdigit. Please help in Pyrhon?​

Answers

Chicken with a side of fries is c is the answer x-9(6)^2

The time taken to complete a motorcycle race is normally distributed, with an average time (µ) of 2.5 hours and a standard deviation (sigma) of 0.5 hours.
What is the probability that a

Answers

The probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to finish the race is said to be 0.0781 = 7.81% probability.

What is the probability about?

Probability is  known to be the way or the measurement of the likelihood that a given event  will take place.

Note that in the case above, the probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to finish the race is said to be 0.0781 = 7.81% probability.

See full question below

The time taken to complete a motorcycle race is normally distributed, with an average time (µ) of 2.5 hours and a standard deviation (sigma) of 0.5 hours.

What is the probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to complete the race?

Learn more about race from

https://brainly.com/question/28062418

#SPJ1

Why did NFL equip its players with RDIF tags?

Answers

NFL equip its players with RDIF tags so as aid or support them to take a lot of statistical information about the players e.g. their position, speed, acceleration and others. The data taken is often used in making a lot of analysis and coaching decisions linked to the players.

Why did NFL equip it's players with RFID tags?

This is known to be often done so that it can aid location tracking, a lot of NFL equips each player with a minimum of two RFID tags.

Hence,  NFL equip its players with RDIF tags so as aid or support them to take a lot of statistical information about the players e.g. their position, speed, acceleration and others. The data taken is often used in making a lot of analysis and coaching decisions linked to the players.

Learn more about NFL from

https://brainly.com/question/15262528

#SPJ1

42. 43. 44. 45. 46. 47. 48 Abrasion, incised, punctured are examples of (b) strain (c) wound (a) sprain Strain is to muscle while sprain is to (a) flesh (b) blood (c) bone The natural world in which people, plants and animals live in is (a) town (b) house (c) village The act of making places and things dirty, harmful and noisy is (a) pollution (b) game (c) pollutants A set of programs that controls and coordinates the internal ac (a) translator (b) system software (c) u The following are safety measures to be considered when usin (a)overload power point (b) sitting posture (c) using the anti- (d) positioning of the monitor base ​

Answers

Abrasion, incised, punctured are examples of wound .

What type of injury is abrasion?

Abrasions is known to be a kind of superficial injuries that happens to the skin and also the visceral linings of the body.

Note that it also lead to  a break in the lifetime of tissue and as such one can say that Abrasion, incised, punctured are examples of wound .

Learn more about Abrasion from

https://brainly.com/question/1147971

#SPJ1

Describe the five components of a computer

Answers

Answer:

Input, Processing, Storage, Output and Communication devices.

Explanation:

Input devices of computer are like Keyboard, Mouse, Scanner. Output devices of a computer are printers, monitors, and headphones.

There are two storages of computer one of them is REM, which can be lost if computer shutdown/closes. Data stays written on the disk until it's erased or until the storage medium fails (more on that later). An example of a communication device is the microphone.

class Main {

static void printPowers(int howMany, int nrRows) {

int n=1;

while(n<=nrRows) {

int power = 1;

while(power <= howMany) {

System.out.printf("%d ", (int) Math.pow(n,power));

power++;

}

System.out.println();

n++;

}

}



public static void main(String[] args) {

printPowers(3,5);

}

}
1. Rewrite your method printPowers from 7B to use a for loop instead of a while loop.

2. Rewrite your method printPowers from 7B to use a do-while loop instead of a while loop.

Answers

Answer:

class Main {

 static void printPowers(int howMany, int nrRows) {

   for(int n=1; n<=nrRows; n++) {

     for(int power = 1; power<=howMany; power++) {

       System.out.printf("%d ", (int) Math.pow(n, power));

     }

     System.out.println();

   }

 }

 public static void main(String[] args) {

   printPowers(3, 5);

 }

}

class Main {

 static void printPowers(int howMany, int nrRows) {

   int n = 1;

   do {

     int power = 1;

     do {

       System.out.printf("%d ", (int) Math.pow(n, power));

       power++;

     } while (power <= howMany);

     System.out.println();

     n++;

   } while (n <= nrRows);

 }

 public static void main(String[] args) {

   printPowers(3, 5);

 }

}

Explanation:

The for loop gives the cleanest, shortest code.

11. Written and artistic expressions are protected by
A. digital ethics.
OB. intellectual property law.
0000
OC. infringement.
D. social media.

Answers

Answer:

B

Explanation:

Written and artistic expressions are protected by intellectual property law.

Why should you make sure the paper being used in a printer is dry and not damp?

Answers

Answer:

because the printer ink is liquid

Explanation:

you need a dry paper to let the ink sit in place and print out the exact same thing that u needed to print if you're printing on a damp paper there is a chance it will affect the output of whatever your printing

Using damp paper in a printer can lead to ink smudging, paper jams, reduced print quality, and potential damage to the printer.

We have,

Using dry paper in a printer is important because damp or wet paper can cause several issues:

- Ink Absorption and Smudging: Damp paper can absorb ink unevenly, leading to smudging, bleeding, and blurred printouts. The ink may not dry properly on damp paper, affecting the print quality.

- Paper Jam: Wet or damp paper can stick together or to printer rollers, increasing the likelihood of paper jams. This can damage the printer and disrupt the printing process.

- Curling and Wrinkling: Moisture can cause paper to curl, warp, or wrinkle, making it difficult to feed through the printer's mechanisms properly. This can result in misaligned printing and paper feeding issues.

- Print Quality: Wet or damp paper can affect the color saturation and clarity of the printouts, resulting in poor print quality and reduced legibility.

- Drying Time: If the paper is wet, it will need time to dry before it can be used in the printer. Printing on wet paper can result in a smeared or faded appearance due to the ink's interaction with moisture.

- Overall Printer Health: Consistently using damp paper can lead to printer damage over time, affecting various components like rollers, cartridges, and print heads.

Thus,

Using damp paper in a printer can lead to ink smudging, paper jams, reduced print quality, and potential damage to the printer.

Learn more about printers here:

https://brainly.com/question/5039703

#SPJ3

Other Questions
What is the midpoint of the segment shown below? The Midwest Division of Grainger Company has investment center average invested assets of $200,000 and investment center income of $40,000. What is the return on investment for this division? Each coin has a mass of 21.94 g and a volume of 2 mL which of the following metals are the coins made of What is an advantage of using medical coding? One angle of a triangle measures twice the smallest angle. The third angle measures five more than twice the smallest angle. Find the measure of the smallest angle. A type of sampling in which individuals to be interviewed are selected based on their proportion or quota in the general population being polled is known as f(x)=- x ^ 2 - 1,x ne5\\ -3,x=5 lim x -> 5 f(x) = lim x -> 5 f(x) Find if The accounting records of Hampton Company provided the data below ($ in thousands). From Dan's ranch one road is built to get to Andy's house two roads are built to get wo Willies house. How many way are there now to get from Andys house to Willies house? The age at which a baby was weaned would have the most impact on the ________ stage. Please help, I don't get what does this means3. Name the compound sodium makes with the following elements. (a) Calcium carbonate: Look at the balance scale in this section, which represents equilibriumcreate your own simple metaphor illustrating how demand and supply work together to create equilibrium. label the following on your metaphor quantity demanded, quantity supplied, equilibrium point, According to the graph, for which values of x is y always negative? What was one reason that the Black Panthers Party formed? Paolo helped in the community garden for 2 3/4 hours this week. That was 1 5/6 equal length shifts, because Paolo stopped early one day when it started to rain.How long is a single shift?PLS HELP ASAP Which federal guidelines regarding recommended physical activity have been established for adults ages 1464? In traditional programming, probably the most often used error-handling outcome was to ____.Group of answer choicesterminate the program in which the offending statement occurredignore the errorhandle the errorask the user for additional input DRIVERS EDUCATION Write a paragraph describing the differences in how a driver should approach a railroad crossing as opposed to a regular intersection. Determine the vertical asymptotes for the reciprocal of this function f(x)=x^2 + 3x -28 attractive forces between molecules in a solid are stronger than bonds between atoms in a molecule