Question

In: Computer Science

You have been hired by a home security company to design and implement a home alarm...

You have been hired by a home security company to design and implement a home alarm

system. The logic of the system is as follows: once the alarm system has been armed, it is to

sound if the front door is opened, the back door is opened or either of two windows is

opened (you can assume there are only two windows).

Design the necessary circuit to implement the situation described above.

Your circuit should have five inputs (A = alarm, F = front door, B = back door, W1 = window

1 and W2 = window 2). A = 1 means the system is armed; A = 0 means it is disarmed. F = 1

means the front door is open; F = 0 means it is closed. (Similarly for the back door and the

windows.) There should be one output, S. When S = 1 the alarm should sound; S = 0

means the alarm is silent. Please use these letters to indicate the inputs and the output

Be CAREFUL to get the correct function for your five inputs before simplifying and designing the circuit. You should minimize the circuit. Your inputs and output should be labeled.

please include the following:

  • Drawing of your completed circuit including all appropriate labels.
  • Truth tables for the circuit (use Word table feature)
  • Kmap for the circuit (use Word table feature)
  • Details (show your work) on what was done to simplify the circuit
  • A brief written summary (250 to 500 words) of the process you followed, decisions made in laying out the circuit, etc..
  • IMPORTANT: please include an explanation on how you put together the kmap based on the truth table, how you made the groupings on the kmap, and how you were able to simplify them in order to create the final circuit

Solutions

Expert Solution

Solution :

In the given question, the truth table will have 5 entries each for the doors, front and back and two windows and the alarm being armed. Based on the question, if any of the front door, back door or either of the two windows are open and having the alarm armed will lead to the sounding of alarm.

So we will have 5 input in the truth table and one output representing S called as alarm sound. If any of the the doors or windows have corresponding 1's in a particular row will lead to the sounding of alarm and hence S set its state to 1.

From the top of the truth table to the half way mark, all the the the the output are zero since the alarm is not armed (A=0). And for the alarm being armed, the required output will be based on the conditions mentioned above.

We have 32 rows in our truth table so it is required to create a k map for five inputs. To avoid the large ke map we will take a shortcut of setting A to 1 and creating the k map for the second half of the truth table from row 16 to 31. For this portion A is fixed at 1 only. Therefore in the final equation A will be ANDed to the final expression. Now We combine and form loop in the k map to reach a conclusive final reduced expression. And at last, we make circuitry according to the final expression and mentioned the number of different types of logic gates used in the the finalized circuit.

I have tried to explain it in very simple language and
I hope that i have answered your question satisfactorily.Leave doubts in comment section if any.


Related Solutions

You have been hired as consultants to design and implement a widespread security initiative for a...
You have been hired as consultants to design and implement a widespread security initiative for a rapidly expanding global eCommerce corporation with two websites and locations in New York, Chicago, San Francisco, London, Paris and Johannesburg. Business is good! In the next three months, the corporation will be acquiring another company in a different line of business with plans to offer products for sale online. Part of your role is to recommend the best way for integrating both environments. However,...
You have been hired as a security and data analyst for a company operating an online...
You have been hired as a security and data analyst for a company operating an online social media platforman. You are tasked to work on a project to identify possible threats related to fake user accounts (so called sibyls ). How can you get started on the project? Try to break it down using the the six phases of the CRISP-DM process. Start your analysis by explaining briefly what the goal of each phase of CRISP-DM is. Use bullet structured...
1. You have been hired to design an internet marketing strategy for a company that sells...
1. You have been hired to design an internet marketing strategy for a company that sells herbs and spice. Describe the opportunities and challenges that business will face in an online environment.
Experimental Study Design Suppose that you have been hired by the university administration to design a...
Experimental Study Design Suppose that you have been hired by the university administration to design a randomized experimental study to assess the following hypothesis among undergraduate students: Attending weekly yoga classes leads to better performance on exams. Be sure that your study design addresses the following elements: Refine the study hypothesis so that it is as specific as possible and contains all elements of a “good” hypothesis. Remember that the design, conduct, and analysis of the study flows from the...
You have been hired as a security consultant for a law firm. Which of the following...
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm? A) Wireless Network B) Employees C) Authentication procedures D) Lack of data encryption
You have been hired by a research institution to design a study to examine the effects...
You have been hired by a research institution to design a study to examine the effects of a drug (used by physicians to control expectant mothers' nausea over the course of a pregnancy) on infant hearing at birth, 6 months and one year. Briefly explain how you might do this using a cross-sectional design, noting benefits and drawbacks. Then explain what a longitudinal design is and how it would improve on your original approach. Lastly, is there another method to...
The following is an Excel question: You have been hired by Club 2010 to design and...
The following is an Excel question: You have been hired by Club 2010 to design and implement a worksheet for the "greeter" at the door to use to determine whether people are old enough to enter. Create a model that allows the user to enter his/her birth date. The model should compute the user’s age and in another cell, it should appear either "Welcome" if the person is at least 21 years old as of today, or "Sorry, you are...
You have been asked to design a network (wired, wireless, or a combination) for a home...
You have been asked to design a network (wired, wireless, or a combination) for a home on which construction will start soon. The home is serviced by a cable TV provider and local phone company, and both provide Internet connectivity. It has two levels totaling 250 meters2 (2700 feet2). Five people will live in the home and use three laptop/tablet computers, a desktop computer, a multimedia server, an Internet-connected TV device (for example, TiVo or digital cable DVR), two multifunction...
Design and implement a Fire Alarm IOT System, using the framework of the Raspberry PI device,...
Design and implement a Fire Alarm IOT System, using the framework of the Raspberry PI device, temperature, C02 and CO sensors. •Define the process specification of the system. The system should collect and analyze the sensor data and email alerts when a fire is detected •Define the domain model for this IOT device •Define the Service specifications
Create a high-level design for a home alarm system. Assume that there are 4 windows and...
Create a high-level design for a home alarm system. Assume that there are 4 windows and 2 doors. The windows and doors have light sensors, so if any object crosses the light path, an appropriate event will be registered. Also, each window and door has latches with sensors that detect if the latch has been turned. Your solution will consist of the following parts 1.       Use a variable “Armed” to allow a user to arm the alarm system. So if a...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT