EXPERT'S EDGE


"The greatest barrier to success is the fear of failure"

by:Sven Goran Eriksson

Tuesday, December 22, 2009

latest project topics

BUS STOP NAME INDICATION SYSTEM

If the passenger has some residual vision, they may see outlines of useful landmarks that indicate the approach to their bus stop. The near or totally blind rely on identifying directional changes that the bus makes to find their bus stop. Seeking confirmation from a fellow passenger or from the driver is another alternative although it does require a lot of confidence to do this.

Keeping in mind these problems, this system has been planned to facilitate a blind person or a person new to the area who doesn’t have knowledge on bus stop information.

This system has a transmitter at every bus stop which continuously transmitting a unique ID .Bus contains a main unit which receives transmitted ID and indicates the passengers the arrived stop.

Transmitter unit comprises of a Microcontroller (AT89c51) unit which generates a unique bus stop ID for every bus stop and multiple transmitter units. IRED to transmit the code. Receiver unit comprises of IR receiver (TSOP1738) to detect and demodulate the transmitted code which is detected by the microcontroller and indication is produced.

latest project topics

PC Based data acquisition system

PC Based data acquisition system by stimulating SPI and I2C protocol

Many times it is required to monitor physical phenomena such as temperature, pressure humidity, light intensity, sound intensity, force, etc. Such physical phenomena can be monitored by digital systems employing sensors. However sensor generally produces a change in the resistance, voltage or current. All such phenomena can be converted in to a change in voltage levels. Since the sensors and the subsequent signal conditioning circuits provide a proportionate change in voltage with respective the phenomena, this cannot be directly interpreted by a digital system. A sensor is ussaually an analog voltage and can take any value between +10 to -10 volts. However a digital system has only two states (ON) or (OFF). Thus it is required to have additional circuitry between the digital systems and analog systems that translate the analog signals in to a digital signals. Such conversion can be perform by an analog to digital converter.

The Serial Peripheral interface Bus or SPI (often pronounced “spy”) bus Is a synchronous serial data link standard that operates in full duplex mode. Devices communicate in master/slave mode where the master device initiates the data frame. Multiple slave devices are allowed with individual slave select (chip select) lines. The I2C bus physically consists of two active wires and a ground connection. The active wires called SDA and SCL, are both bi-directional. SDA is a serial data line, SCL is a serial clock line.

contd....

latest project topics

On power ON, the AC current passes through the fuse and the filter, this filter out any noise or spikes. After the filter passes through the rectifier which converts AC to DC. Next to rectifier it passes through the transformer and provides a constant voltage to the charger. Past of the winding from transformer is taken TOP switch to generate supply. The micro controller reads the input current voltage input coming from the batter and Vref generated in the circuit. The controller generates the current reference voltage to current loop circuit by reading the inputs and adjusting the PWM in the controller according to the inputs taken.

The project involves both hardware and software. The primary component used in the project i.e., PIC16F73 Microcontroller. has to be studied and tested. The other components are available in discrete. These components are to be assembled on the PCB board and then proper connections are to be made. Coded microcontroller i.e., PIC16F73 has to be used in order to perform the charging operation by connecting the PCB module to the system using RS-232 cable.

latest project topics

ASYNCHRONOUS FIFO FOR EMBEDDED APPLICATIONS

DESIGN AND IMPLEMENTATION OF ASYNCHRONOUS FIFO FOR EMBEDDED APPLICATIONS

A FIFO is used as a "First In-First Out" memory buffer between two asynchronous systems with simultaneous write and read access to and from the FIFO, these accesses being independent of one another. Data written into a FIFO is sequentially read out in a pipelined manner, such that the first data written into a FIFO will be the first data read out of the FIFO.

FIFO status flag outputs are a function of the comparison of the respective write and read pointers. A FIFO will always have some status flag outputs; at least a flag that indicates the empty condition and a flag that indicates the full condition.

An asynchronous FIFO refers to a FIFO design where data values are written to a FIFO buffer from one clock domain and the data values are read from the same FIFO buffer from another clock domain, where the two clock domains are asynchronous to each other.

Attempting to synchronize multiple changing signals from one clock domain into a new clock domain and insuring that all changing signals are synchronized to the same clock cycle in the new clock domain has been shown to be challenging. FIFOs are used in designs to safely pass multi-bit data words from one clock domain to another. Data words are placed into a FIFO buffer memory array by control signals in one clock domain, and the data words are removed from another port of the same FIFO buffer memory array by control signals from a second clock domain. Conceptually, the task of designing a FIFO with these assumptions seems to be easy. The difficulty associated with doing FIFO design is related to generating the FIFO pointers and finding a reliable way to determine full and empty status on the FIFO.

In this project, an asynchronous FIFO is designed to pass data between different clock domains using Gray code pointers that are synchronized into a different clock domain before testing for "FIFO full" or "FIFO empty" conditions.

latest project topics

IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD

In the past, cryptography helped ensure secrecy in important communications, such as those of government covert operations, military leaders, and diplomats. Cryptography has come to be in widespread use by many civilians who do not have extraordinary needs for secrecy, although typically it is transparently built into the infrastructure for computing and telecommunications.

Advanced Encryption Standard (AES) is an algorithm for performing encryption (and the reverse, decryption) which is a series of well-defined steps that can be followed as a procedure. The original information is known as plaintext, and the encrypted form as cipher text. The cipher text message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it; it resembles random gibberish to those not intended to read it. The encrypting procedure is varied depending on the key which changes the detailed operation of the algorithm. Without the key, the cipher cannot be used to encrypt or decrypt.

The Rijndael is a symmetric algorithm that encrypts variable size blocks with variable size keys. . The Advanced Encryption Standard (AES) specified a subset of Rijndael, fixing the block size on 128 bits. Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS-197), is an approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits, and this project implements the 128 bit standard using the VHDL, a hardware description language. The National Security Agency (NSA) announced that AES-128 may be used for classified information at the SECRET level and AES-192/256 for TOP SECRET level documents.

latest project topics

GSM BASED HOME AUTOMATION

Home automation (also called domotics) is a field within building automation,specialixing in the specigic automation requirements of private homes and in the application of automation technique for the comfort and security of its residents.

Athough many techniques used in building automation(such as light and climate control ,control of doors and window shutters ,security and surveillance systems,etc.)are also used in home automation, additional functions in home automation can include the control of multimedia home entertainment systems,automatic plant watering and pet feeding,automatic sences for dinners and parties,and more user friendly control interface.When home automation is installed during construction of new home,usually control wires are added before the dry wall is installed.these control wires run to a micro controller,which will then control the encironment.

Implementation methodology:

Wireless communication of various machines and devices in mobile networks is a fast growing business and application area in industry, maintenance business,customer service,security and banking areas.This paper presents design and implementation of remote conrol system by means of GSM cellular communication network. The design integrates the to be controlled, the micro controller .and GSM module so that it can be used for a wide range of applications.

An AVR microcontroller is used to control the home appliances and it will communicate to the GSM modem through the serial port of controller. Most of the home appliances are connected to AC mains so, a special care is to be taken to switch the appliances.

latest project topics

INTELLIGENT BATTERY CHARGING

INTELLIGENT BATTERY CHARGING USING PIC16F73 MICRO CONTROLLER FOR MISSILE TEST EQUIPMENT.

It is designed and developed based on microprocessor technology for Konkurs Missile Test Equipment (KMTE) assembled on a PCB module mounted on a bracket, in turn to be fitted on front panel PCB frame of test equipment.

Charger is intended to charge Ni-Cd/Ni-Al battery pack capacity of 1.8AH/2.2AH respectively. It shall operate on AC mains power of 230V AC at 50Hz with specified variation. The regulated power supply of charger works on SMPS and converts incoming AC voltages to DC(maximum 60V) for charging the battery. Charging is done in two modes. Normal mode and boost mode. At the end of normal/boost charge, the charges automatically charge over to the trickle mode. Mode of changing is switch selectable and the charging mode can be indicated LEDs which are connected on D-type connector.

The charge is based on a PIC16F73 micro controller. The micro controller provides desired features of time tracking, detection of negative voltage shift to monitor the charging process. The input AC voltage is passed through the input fuse and line filter, followed by bridge rectifier. The resultant DC voltage is fed to the transformer with the separate taps for charger circuit and micro controller circuit. Output of the charge is maintained at nominal voltage of 60V DC. Required sense lines and control lines are provided between the charger circuit and microprocessor circuit. The status of charging is detected using micro controller provision is available for selection of normal boost charge. LED can be connected to the connector for charge indicator. Selection provision shall also be made for selection in battery type.

latest project topics

AES is implemented by using VHDL

The algorithm consists of four stages that make up a round which is iterated 10 times for a 128-bit length key, 12 times for a 192-bit key, and 14 times for a 256-bit key. The first stage "SubBytes" transformation is a non-linear byte substitution for each byte of the block. The second stage "ShiftRows" transformation cyclically shifts (permutes) the bytes within the block. The third stage "MixColumns" transformation groups 4-bytes together forming 4-term polynomials and multiplies the polynomials with a fixed polynomial mod (x^4+1). The fourth stage "AddRoundKey" transformation adds the round key with the block of data.

The hardware implementation of AES could provide either high performance or low cost for specific applications. At backbone communication channels, or at heavily loaded server, it is not possible to lose processing speed running cryptography algorithms in general software, which drops the efficiency of the overall system. On the other side, a low cost and small design can be used in smart card applications, allowing a wide range of equipment to operate securely.

The design goal of this project is to create a demonstration of the AES-128 for the end user and not for integration into a communication or data storage device; however this design could be modified to such ends. The main objective of the project is to produce an optimized VHDL code for performance purpose, capable of achieving better performance than common software implementation.

The proposed project AES is implemented by using VHDL. The device is operated at 100.29 MHz when targeted to Spartan 3E.

latest project topics

COMPLEX PROGRAMMABLE LOGIC DEVICE

As chip densities increased, it was natural for the PLD manufacturers to evolve their products into larger (logically, but not necessarily physically) parts called Complex Programmable Logic Devices (CPLDs). For most practical purposes, CPLDs can be thought of as multiple PLDs (plus some programmable interconnect) in a single chip. The larger size of a CPLD allows we to implement either more logic equations or a more complicated design. In fact, these chips are large enough to replace dozens of the pesky parts.

Because CPLDs can hold larger designs than PLDs, their potential uses are more varied. They are still sometimes used for simple applications like address decoding, but more often contain high-performance control-logic or complex finite state machines. At the high-end (in terms of numbers of gates), there is also a lot of overlap in potential applications with FPGAs. Traditionally, CPLDs have been chosen over FPGAs whenever high-performance logic is required. Because of its less flexible internal architecture, the delay through a CPLD (measured in nanoseconds) is more predictable and usually shorter.

latest project topics

Design and Implementation of RC4 stream for WI-FI

In Cryptography the main feature is to work out with problems, which associated with secrecy, authentication and integrity. In order to handle all the cryptographic problems many kinds of cryptographic algorithms have been invented. The complexity of these problems made several categories of cryptographic algorithms. A much known is the RC4 stream cipher. The project deals with the design of RC4 stream cipher for wireless LAN security.

The 802.11 is a wire LAN, uses a collision avoidance (CSMA/CA) mechanism together with a positive acknowledges scheme and critical carrier sense as well as physical carrier sense methods. The important part of wireless MAC layer design is the security (WEP/RC4 algorithm) implementation. The security protocol is the part of the data link layer. This protocol uses RC4 cryptographic algorithm and its intention is to prevent attempts of thefts and invasions. RC4 is the most widely-used software stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless networks) and is remarkable for its simplicity and speed in software.

RC4 uses a variable key from 1 to 256 bytes to initialize a 256-byte array. the array is used for subsequent generation of pseudo-random bytes and then generates a pseudorandom stream, which is XORed with the plaintext/cipher text to give the cipher text/plain text. The RC4 stream cipher works in two phases the key setup phase and the pseudorandom key stream generator phase. Both phases must be performed for every new key. The primary functions are generation of 256-bytes key data from variable key length (6to16bytes), initialization of the key setup, swapping of 256-bytes between two blocks of 256 bytes (to randomize the bytes). Control and storage blocks design and implementation and key stream cipher bytes generation.

latest seminar topics

Symfony

Symfony is a web application framework for PHP5 projects.It aims to speed up the creation and maintenance of web applications, and to replace the repetitive coding tasks by power, control and pleasure.

latest seminar topic

XPCOM

similar to (Cross Platform Component Object Model) is a cross platform component modelCORBA or Microsoft COM. It has multiple language bindings and IDL descriptions so programmers can plug their custom functionality into the framework and connect it with other components.