Cabinet Lock Controller

Cabinet Lock Controller

Coursework Title: Cabinet Lock Controller
Coursework Title:
Cabinet Lock Controller
Module Name:
Microprocessors and Software
Module Code:
J D Cullen
If you have any issues with this coursework you may contact your lecturer.
Issue Date:
20th November 2014
Hand-in Date:
12th January 2015
(changed from 8th January 2015 due to Blackboard maintenance)
Hand-in Method:
Online (Blackboard)
BEng. (Hons) Electrical and Electronic Engineering
You should submit the following:
Task 1)
Please submit a short report indicating the functionality of your application. Include in this report your
program design.
You should also submit your assembly file (.ASM file) so I can verify its operation in picsim. The assembly
file should include comments and compile successfully using gpasm. If you do not submit this file you
will automatically be awarded 0% out of 50% for the program implementation.
Task 2)
You should submit a short report of 3 pages or less
The completed reports and flow charts should be saved as pdf files
These pdf files, along with the commented source code file should be zipped and submitted via
Coursework Specification
AlockCo, the leading cabinet lock maker has hired you as a new development engineer to provide
digital locks for the company to complement their current key locks. They have sourced a Pic
development board, the McLab1, which is the same as Board 1 within the PICSIM simulator and wish
for you to develop a lock for the company using this board. You will use the PICSIM software to verify
your code.
The managing director, coming from a mechanical engineering does not fully understand the
differences between differing standard, realtime and distributed operating systems, so has asked for a
report on what these are and how they could be used within the business for future lock
Task 1) 80% split as 30% for program design, 50% for program implementation
Create an assembly application for the pic microcontroller to operate a digital lock on a filing cabinet.
You should design your application using an appropriate method (flowchart/pseudo code) and then
implement this on PICSIM board 1. The specification of what is required is as follows:
You will use two buttons (RA1 and RA2) to cycle up and down the 16 codes available, and use a
third button (RA3) to select that code. You will display the code as an LED bit pattern on portB
(bits 0:3)
If the code is incorrect you will increase a counter which is also shown on portB (bits 6:7), but
only if the lock is closed, if it is already open then you will not increase the counter.
On the third unsuccessful code you will permanently lock the device, so your input buttons stop
working. (to restart the lock you will need to use the RESET button)
If the code is OK when selected you will open the lock (shown by turning on the RA0 LED), if
there have been any unsuccessful attempts, then this counter will be cleared.
To close the lock, you will need to set the correct code then press the OK button again, also
turning off RA0.
If the lock is open, you can change the code by selecting a new code using the up and down
buttons then pressing RA4.
You should provide the details of any assumptions made.
Task 2) 20%
Provide a short report (maximum 3 pages including references) to the managing director that answers
the following questions:
What are the differences between the following operating systems (max 1.5 pages)
General Purpose Operating System
Real-time Operating System
Distributed Operating System
What advantages would there have been to utilising a Real Time Operating System in this project?
Would there be additional costs resulting from the implementation of Real Time Operating Systems?
In the future the company would like to include computer network connectivity to the lock controller.
What would be the impact of not using operating systems to complete this task?
Marking Scheme or Guide to Assessment Criteria
Task 1 80%
Task 2 20%
See marking grid for detailed mark allocation.
4002ELE Embedded Systems
Grade descriptors and feedback sheet for Cabinet Lock
Assignment 1 (2012/13)
Student Name:
Student Number:
Below 40%
40 to 49%
diagram details some
requirements but does
not contain correct
50 to 59%
Satisfactory coverage
of requirements and
mostly uses correct
60 to 69%
All requirements are
covered with
satisfactory formatting
Diagram presented in
a professional manner.
Requirements clearly
covered. Formatting is
Assembly Code Design – Does the diagram provide an accurate
representation of the operational requirements? Is the diagram
clear and well structured? Does the annotation of the diagram
follow standards
Diagram fails to
capture the
requirements of the
Assembly Code –- Is the code written using a formal notation. Is
the code well written? Does your application meet the
requirements set out in the requirements specification
Application provides
little of the required
functionality, there is
little structure and few
Application provides
some of the
functionality required.
Is moderately well
written. With few
Application code
performs most of the
requirements. Little
formal notation and
Application performs
as per the
requirements. Some
structure and
Application meets the
requirements is well
written i.e. not
verbose. Makes good
use of comments.
Operating system report – Is the report well written does it
address the questions posed?
Discussion is missing
or very limited and
demonstrates that the
student does not have
a clear understanding
of the questions
Discussion is limited
and demonstrates that
the student has only a
basic understanding of
the questions
Discussion is of a
satisfactory standard
and demonstrates that
the student has a clear
understanding of
Discussion is of a high
standard and
demonstrates that the
student has a good
understanding of the
questions external
sources have been
Discussion is of an
excellent standard and
demonstrates that the
student has a deep
understanding of the
questions a good
range of external
sources have been
Please provide descriptive feedback in this section.
Guide to Performance Criteria
70% and above:
Your work must be of outstanding quality and fully meet the requirements of the coursework
specification and learning outcomes stated. You must show independent thinking and apply this to your
work showing originality and consideration of key issues. There must be evidence of wider reading on
the subject.
Key words which may describe a coursework at this level include: appraises, compares, concludes, contrasts,
criticizes, critiques, defends, discriminates, evaluates, explains, interprets, justifies, relates, supports.
60% – 70%:
Your work must be of good quality and meet the requirements of the coursework specification and
learning outcomes stated. You must demonstrate some originality in your work and show this by
applying new learning to the key issues of the coursework. There must be evidence of wider reading on
the subject.
Key words which may describe a coursework at this level include: categorizes, combines, compiles, creates,
devises, generates, modifies, reconstructs, identifies, illustrates, outlines, synthesizes.
50% – 60%:
Your work must be comprehensive and meet all of the requirements stated by the coursework
specification and learning outcomes. You must show a good understanding of the key concepts and be
able to apply them to solve the problem set by the coursework. There must be enough depth to your
work to provide evidence of wider reading.
Key words which may describe a coursework at this level include: demonstrates, changes, applies, operates,
produces, predicts, shows, solves, uses, translates, comprehends, converts, generalizes.
40% – 50%:
Your work must be of a standard that meets the requirements stated by the coursework specification
and learning outcomes. You must show a reasonable level of understanding of the key concepts and
principles and you must have applied this knowledge to the coursework problem. There should be some
evidence of wider reading.
Key words which may describe a coursework at this level include: comprehends, defines, describes, identifies,
knows, labels, lists, matches, outlines, recalls, recognizes, reproduces, selects, states, rewrites.
Below 40%:
Your work is of poor quality and does not meet the requirements stated by the coursework specification
and learning outcomes. There is a lack of understanding of key concepts and knowledge and no
evidence of wider reading.
Recommended reading
Ramesh S. Gaonkar, ‘Microprocessor Architecture, Programming, and Applications with the 8085’, 2002
Prentice Hall fifth edition.
Fredrick M. Cady, ‘Microcontrollers and Microcomputers’, 1997 Oxford University Press, Inc.
Donald P. Leach and Albert P. Malvino, ‘Digital Principles and Applications’, 1994 McGraw-Hill fifth
Lin, W.C.’Microprocessors: Fundamental and Applications’
Douglas V. Hall ‘Microprocessors and Interfacing: Programming and Hardware’
Extenuating Circumstances
If something serious happens that means that you will not be able to complete this assignment, you
need to contact the module leader as soon as possible. There are a number of things that can be done
to help, such as extensions, waivers and alternative assessments, but we can only arrange this if you tell
us. To ensure that the system is not abused, you will need to provide some evidence of the problem.
More guidance is available at
Any coursework submitted late without the prior agreement of the module leader will receive 0
Academic Misconduct
The University defines Academic Misconduct as ‘any case of deliberate, premeditated cheating,
collusion, plagiarism or falsification of information, in an attempt to deceive and gain an unfair
advantage in assessment’. The School takes Academic Misconduct very seriously and any suspected
cases will be investigated through the University’s standard policy (Academic Misconduct Policy). If you
are found guilty, you may be expelled from the University with no award.
It is your responsibility to ensure that you understand what constitutes Academic Misconduct and to
ensure that you do not break the rules. If you are unclear about what is required, please ask.
Cheating includes:
(i) any form of communication with, or copying from, any other source during an examination;
(ii) communicating during an examination with any person other than an authorised member of
(iii) introducing any written, printed or other material into an examination (including
electronically stored information) other than that specified in the rubric of the examination
(iv) gaining access to unauthorised material in any way during or before an assessment;
(v) the use of mobile phones or any other communication device during an assessment or
(vi) the submission of false claims of previously gained qualifications, research or experience in
order to gain credit for prior learning;
(vii) the falsification of research data, the presentation of another’s data as one’s own, and any
other forms of misrepresentation in order to gain advantage;
(viii) the submission of work for assessment that has already been submitted as all or part of the
assessment for another module without the prior knowledge and consent of the Module Leader
for the subsequent assessments;
(ix) the submission of material purchased or commissioned from a third party, such as an essay-writing
service, as one’s own.
Plagiarism is defined as the representation of the work, artefacts or designs, written or otherwise, of
any other person, from any source whatsoever, as the student’s own. Examples of plagiarism may be as
i) the verbatim copying of another’s work without clear identification and acknowledgement
including the downloading of materials from the Internet without proper referencing of
ii) the paraphrasing of another’s work by simply changing a few words or altering the order of
presentation, without clear identification and acknowledgement;
iii) the unidentified and unacknowledged quotation of phrases from another’s work;
iv) the deliberate and detailed presentation of another’s concept as one’s own.
Collusion includes:
(i) the conscious collaboration, without official approval, between two or more students in the
preparation and production of work which is ultimately submitted by each in an identical or
substantially similar form and/or is represented by each to be the product of his or her
individual efforts;
(ii) collusion also occurs where there is unauthorised co-operation between a student and
another person in the preparation and production of work which is presented as the student’s
For more information you are directed to following the University web pages:
Information regarding academic misconduct:
Information on study skills:
Information regarding referencing:


Do You Need A Similar Assignment?

Place an order with us. Our skilled and experienced writers will deliver a custom paper which is not plagiarized within the deadline which you will specify.

Note; 6 Hours urgent orders deliver also available.

If you need more clarifications contact our support staff via the live chat for immediate response.


Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page: