Cabinet Lock Controller;
BEng. (Hons) Electrical and Electronic Engineering
You should submit the following:
Please submit a short report indicating the functionality of your application. Include in this report your
You should also submit your assembly file (.ASM file) so I can verify its operation in picsim. The assembly
file should include comments and compile successfully using gpasm. If you do not submit this file you
will automatically be awarded 0% out of 50% for the program implementation.
You should submit a short report of 3 pages or less
The completed reports and flow charts should be saved as pdf files
These pdf files, along with the commented source code file should be zipped and submitted via
AlockCo, the leading cabinet lock maker has hired you as a new development engineer to provide
digital locks for the company to complement their current key locks. They have sourced a Pic
development board, the McLab1, which is the same as Board 1 within the PICSIM simulator and wish
for you to develop a lock for the company using this board. You will use the PICSIM software to verify
The managing director, coming from a mechanical engineering does not fully understand the
differences between differing standard, realtime and distributed operating systems, so has asked for a
report on what these are and how they could be used within the business for future lock
Task 1) 80% split as 30% for program design, 50% for program implementation
Create an assembly application for the pic microcontroller to operate a digital lock on a filing cabinet.
You should design your application using an appropriate method (flowchart/pseudo code) and then
implement this on PICSIM board 1. The specification of what is required is as follows:
You will use two buttons (RA1 and RA2) to cycle up and down the 16 codes available, and use a
third button (RA3) to select that code. You will display the code as an LED bit pattern on portB
If the code is incorrect you will increase a counter which is also shown on portB (bits 6:7), but
only if the lock is closed, if it is already open then you will not increase the counter.
On the third unsuccessful code you will permanently lock the device, so your input buttons stop
working. (to restart the lock you will need to use the RESET button)
If the code is OK when selected you will open the lock (shown by turning on the RA0 LED), if
there have been any unsuccessful attempts, then this counter will be cleared.
To close the lock, you will need to set the correct code then press the OK button again, also
turning off RA0.
If the lock is open, you can change the code by selecting a new code using the up and down
buttons then pressing RA4.
You should provide the details of any assumptions made.
Task 2) 20%
Provide a short report (maximum 3 pages including references) to the managing director that answers
the following questions:
What are the differences between the following operating systems (max 1.5 pages)
General Purpose Operating System
Real-time Operating System
Distributed Operating System
What advantages would there have been to utilising a Real Time Operating System in this project?
Would there be additional costs resulting from the implementation of Real Time Operating Systems?
In the future the company would like to include computer network connectivity to the lock controller.
What would be the impact of not using operating systems to complete this task?
Marking Scheme or Guide to Assessment Criteria
Task 1 80%
Task 2 20%
See marking grid for detailed mark allocation.
4002ELE Embedded Systems
Grade descriptors and feedback sheet for Cabinet Lock
Assignment 1 (2012/13)
40 to 49%
diagram details some
requirements but does
not contain correct
50 to 59%
of requirements and
mostly uses correct
60 to 69%
All requirements are
Diagram presented in
a professional manner.
covered. Formatting is
Assembly Code Design – Does the diagram provide an accurate
representation of the operational requirements? Is the diagram
clear and well structured? Does the annotation of the diagram
Diagram fails to
requirements of the
Assembly Code –- Is the code written using a formal notation. Is
the code well written? Does your application meet the
requirements set out in the requirements specification
little of the required
functionality, there is
little structure and few
some of the
Is moderately well
written. With few
performs most of the
formal notation and
as per the
Application meets the
requirements is well
written i.e. not
verbose. Makes good
use of comments.
Operating system report – Is the report well written does it
address the questions posed?
Discussion is missing
or very limited and
demonstrates that the
student does not have
a clear understanding
of the questions
Discussion is limited
and demonstrates that
the student has only a
basic understanding of
Discussion is of a
and demonstrates that
the student has a clear
Discussion is of a high
demonstrates that the
student has a good
understanding of the
sources have been
Discussion is of an
excellent standard and
demonstrates that the
student has a deep
understanding of the
questions a good
range of external
sources have been
Please provide descriptive feedback in this section.
Guide to Performance Criteria
70% and above:
Your work must be of outstanding quality and fully meet the requirements of the coursework
specification and learning outcomes stated. You must show independent thinking and apply this to your
work showing originality and consideration of key issues. There must be evidence of wider reading on
Key words which may describe a coursework at this level include: appraises, compares, concludes, contrasts,
criticizes, critiques, defends, discriminates, evaluates, explains, interprets, justifies, relates, supports.
60% – 70%:
Your work must be of good quality and meet the requirements of the coursework specification and
learning outcomes stated. You must demonstrate some originality in your work and show this by
applying new learning to the key issues of the coursework. There must be evidence of wider reading on
Key words which may describe a coursework at this level include: categorizes, combines, compiles, creates,
devises, generates, modifies, reconstructs, identifies, illustrates, outlines, synthesizes.
50% – 60%:
Your work must be comprehensive and meet all of the requirements stated by the coursework
specification and learning outcomes. You must show a good understanding of the key concepts and be
able to apply them to solve the problem set by the coursework. There must be enough depth to your
work to provide evidence of wider reading.
Key words which may describe a coursework at this level include: demonstrates, changes, applies, operates,
produces, predicts, shows, solves, uses, translates, comprehends, converts, generalizes.
40% – 50%:
Your work must be of a standard that meets the requirements stated by the coursework specification
and learning outcomes. You must show a reasonable level of understanding of the key concepts and
principles and you must have applied this knowledge to the coursework problem. There should be some
evidence of wider reading.
Key words which may describe a coursework at this level include: comprehends, defines, describes, identifies,
knows, labels, lists, matches, outlines, recalls, recognizes, reproduces, selects, states, rewrites.
Your work is of poor quality and does not meet the requirements stated by the coursework specification
and learning outcomes. There is a lack of understanding of key concepts and knowledge and no
evidence of wider reading.
Ramesh S. Gaonkar, ‘Microprocessor Architecture, Programming, and Applications with the 8085’, 2002
Prentice Hall fifth edition.
Fredrick M. Cady, ‘Microcontrollers and Microcomputers’, 1997 Oxford University Press, Inc.
Donald P. Leach and Albert P. Malvino, ‘Digital Principles and Applications’, 1994 McGraw-Hill fifth
Lin, W.C.’Microprocessors: Fundamental and Applications’
Douglas V. Hall ‘Microprocessors and Interfacing: Programming and Hardware’
If something serious happens that means that you will not be able to complete this assignment, you
need to contact the module leader as soon as possible. There are a number of things that can be done
to help, such as extensions, waivers and alternative assessments, but we can only arrange this if you tell
us. To ensure that the system is not abused, you will need to provide some evidence of the problem.
More guidance is available at
Any coursework submitted late without the prior agreement of the module leader will receive 0
The University defines Academic Misconduct as ‘any case of deliberate, premeditated cheating,
collusion, plagiarism or falsification of information, in an attempt to deceive and gain an unfair
advantage in assessment’. The School takes Academic Misconduct very seriously and any suspected
cases will be investigated through the University’s standard policy (Academic Misconduct Policy). If you
are found guilty, you may be expelled from the University with no award.
It is your responsibility to ensure that you understand what constitutes Academic Misconduct and to
ensure that you do not break the rules. If you are unclear about what is required, please ask.
(i) any form of communication with, or copying from, any other source during an examination;
(ii) communicating during an examination with any person other than an authorised member of
(iii) introducing any written, printed or other material into an examination (including
electronically stored information) other than that specified in the rubric of the examination
(iv) gaining access to unauthorised material in any way during or before an assessment;
(v) the use of mobile phones or any other communication device during an assessment or
(vi) the submission of false claims of previously gained qualifications, research or experience in
order to gain credit for prior learning;
(vii) the falsification of research data, the presentation of another’s data as one’s own, and any
other forms of misrepresentation in order to gain advantage;
(viii) the submission of work for assessment that has already been submitted as all or part of the
assessment for another module without the prior knowledge and consent of the Module Leader
for the subsequent assessments;
(ix) the submission of material purchased or commissioned from a third party, such as an essay-writing
service, as one’s own.
Plagiarism is defined as the representation of the work, artefacts or designs, written or otherwise, of
any other person, from any source whatsoever, as the student’s own. Examples of plagiarism may be as
i) the verbatim copying of another’s work without clear identification and acknowledgement
including the downloading of materials from the Internet without proper referencing of
ii) the paraphrasing of another’s work by simply changing a few words or altering the order of
presentation, without clear identification and acknowledgement;
iii) the unidentified and unacknowledged quotation of phrases from another’s work;
iv) the deliberate and detailed presentation of another’s concept as one’s own.
(i) the conscious collaboration, without official approval, between two or more students in the
preparation and production of work which is ultimately submitted by each in an identical or
substantially similar form and/or is represented by each to be the product of his or her
(ii) collusion also occurs where there is unauthorised co-operation between a student and
another person in the preparation and production of work which is presented as the student’s
For more information you are directed to following the University web pages:
Information regarding academic misconduct:
Information on study skills:
Information regarding referencing:
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more