Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Programming Project

i want someone to do this project

CSE 230 Project 3: UART Palindrome Checker

Learning Objectives:

● Create modular code and interface with unfamiliar modularized code

The Task

In this project, you will be writing a program that receives a string of characters via the UART, checks if this

string is a palindrome, and then uses a print function to print either “Yes” or “No”. A palindrome is a sequence

of characters (typically a word or phrase) that is the same both forwards and backwards. For this project, strings

will be terminated using a period (‘.’). You may assume that a string will contain at least one letter in addition to

a period (e.g., the input, “b.”, should be considered a palindrome). You will not need to handle empty strings,

strings containing only a period, or stings containing characters other than letters, spaces, and periods. Your

program should be able to handle multiple strings sent one after another or concatenated together. For

example, the string: “abba. data.” should print “Yes” followed by “No” on the next line. Spaces should be

ignored when checking for a palindrome and the palindrome should not be case sensitive. For example, “A nut

for a jar of Tuna.” would be considered a palindrome.

Print Function

A template PLP project file is available to download on Canvas. The PLP project includes a second ASM file titled,

project3_lib.asm. This ASM file contains the print function used in this project. PLPTool concatenates all ASM

files within a PLP project into a single location in memory (unless additional .org statements have been added to

specify different location for code). No changes to project3_lib.asm should be made.

When called, depending on the value in register $a0, the following string will be displayed on the simulated

UART device’s output. If $a0 contains a zero then “No” will be displayed and if $a0 contains a non-zero value

(e.g. one) then “Yes” will be displayed. The print function is called using the following instruction:

call project3_print

To use the print function, your PLP program needs to initialize the stack pointer ($sp) before performing the

function call (or any other operations involving the stack pointer). For this reason, the template project file

includes an initialization that sets the stack pointer to 0x10fffffc (the last address of RAM).

Template Structure

The template project file contains six function stubs that need to be implemented. Five are called from the main

loop and the sixth is called from “period_check”. The template file contains comments with descriptions of what

each function needs to do and how it should be implemented. The table below provides a brief description of

the functions.

Function Name Function Description

poll_UART

Polling loop for UART’s status register,

reading new character, and indicating

character has been read

period_check

Checks if new character is a period and

makes a nested function call to

palindrome_check if it is

space_check Skips saving space characters to array

case_check
Converts new character to uppercase if it is

lowercase

array_push Saves new character to array

palindrome_check

Moves inwards from front and back of array

and compares characters at each step to

determine if the string is a palindrome. If at

any point mirroring characters are not

equal, then it should use the print function

to print “No”. If the comparison reaches or

passes the midpoint then the print function

should be used to print “Yes”.

Debugging Tools

To show that you properly tested your program, please save your program while it is in simulation mode (the

blue simulation mode button has been toggled on) such that a CPU Memory Visualization window is open and

shows at least the first 6 words of memory in the array. Please keep in mind that the starting address of the

array is relative to the number of initializations placed before the assembler directive allocating space for the

array. If you change your initializations you may need to adjust your CPU Memory Visualization base address.

The Array Example video in this project’s module demonstrates how to set up a CPU Memory Visualization

window. It is acceptable to also see program contents in memory (these cells will be colored blue). For example,

it would be acceptable to see the following in the visualizer after the string, “abcd.”, has been sent by the user.

Additionally, the watcher window should contain, at minimum, registers $v0, $s1, and $s2. You may also include

any other registers in the watcher window that you find useful for debugging.

Points will be deducted if a CPU Memory Visualization window configured to show the start of the array does

not open when simulation mode is toggled on or the watcher window does not include the minimum set of

registers (the watcher window does not need to open when simulation mode is toggled on).

Deliverables:

1. Take the Project 3 Pre Quiz (6 points)

2. Submit your program on Canvas with the format: Firstname_Lastname_project3.plp (21 points)

3. Take the Project 3 Post Quiz (3 point)

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

GitHub

see attachment for details DAT 260 Module Eight Journal Guidelines and Rubric Overview As you have learned in the module resources, GitHub is more than just a place to store code. It is a dynamic community of practice and a living portfolio of your coding skills. In this journal entry,

Blockchain app programming

i have the template provided and you will have to use the term project presentation to complete it.  Secure-Trade CIS-5730 – Blockchain Applications TERM PROJECT PRESENTATION The money is stored in a digital wallet in the blockchain until two parties pass release or refund (Safe, 2026). The same agreement promotes

HIMS 655 ASS8

Watch the YouTube Video MEDICAL CODING ICD-10-CM GUIDELINES LESSON – 1.B – Coder explanation and examples for 2021 Review the ICD-10-CM Official Guidelines for Coding and Reporting at   and in your assignment respond to the following questions: Who is responsible for framing these Guidelines? Why are these guidelines necessary for

HIMS 645 ASS8

Using Internet resources, search  three national and three international healthcare organizations that maintain databases and use the information based on the processed data from these databases in their decision-making process. Briefly describe the organizations and types of data contained in their databases (make sure to remember quality of data points and

W8: Topic 1 – Course Wrap-Up

 Pick one topic from this class that most interested you. State the topic and your reasons for the choice. ii. You need to respond to at least 2 students.  This is part of your grade to be active in the threads and responding to students.   NB: THIS IS THE TOPIC

Big Data Tools and Emerging Technologies

please see attachment  4 [ Note: To complete this template, replace the bracketed text with your own content. Remove this note before you submit your project.] Big Data Tools and Emerging Technologies Paper [Your Name] DAT 260: Emerging Technologies and Big Data [Your Instructor’s Name] [Date—for example, May 1, 2021]

HIMS 655 ASS7

Mapping between SNOMED-CT and ICD-10-CM Note: For completing this assignment, use of the I-MAGIC tool (Interactive Map-Assisted Generation of ICD Codes) is required. To access the I-MAGIC tool, click on the following  ) Problems and diagnoses can be recorded in SNOMED CT in the EHR, while the cross-mappings to ICD-10-CM can

HIMS 645 ASS7

Four types of databases are Relational, Network, Hierarchical, and Object-Oriented. What are their salient features (a table format is acceptable)? Assess their usability for healthcare facilities that generated numerical, text, and images data citing reasons for your choice.  Two most commonly used databases in healthcare organizations are Relational and Object-Oriented (O-O). Both employ respective

MS ACCESS

Need to do a Microsoft Access document for my work.  2 Consideration of MS Access Database Development on Healthcare. Name Instructor School Date Consideration of MS Access Database Development on Healthcare. Introduction The task entailed developing a Microsoft access database of a small healthcare facility, which has just abandoned the

Effective security programs

Organizational policies define the direction for an organization and contribute to its overall security culture by setting the tone on what is and is not acceptable. 

The Equifax Data Breach

Briefly explain what the Equifax data breach was, why it happened, and why it was important. You should mention that Equifax failed to protect personal data, discuss the ethical and security issues involved, and explain what companies can learn from the incident. Please see attached documents.