SlideShare ist ein Scribd-Unternehmen logo
1 von 8
2009
Conclusion Project Ideas




           Eng. Sameh Shawky


           1/1/2009
Data Communication using WiMAX
                                                                                                    Communication is a process that
                                                                                                    allows organisms to exchange
                                                                                                    information by several methods.
                       (PHY Layer Implementation)
                                  Implementation                                                    Communication requires that all
                                                                                                    parties understand a common
                                                                                                    language that is exchanged. There
                                                                                                    are auditory means, such as
                                                                                                    speaking, singing and sometimes
                                                                                                    tone of voice, and nonverbal,
                                                                                                    physical means, such as body
                                                                                                    language sign language,
                                                                                                    language,
                                                                                                    paralanguage touch, eye contact,
                                                                                                    paralanguage,
                                                                                                    or the use of writing. Here we
                                                                                                    implement a WiMAX PHY Layer to
                                                                                                    be used in the communication
                                                                                                    between two parties.

      Prerequisites                   Objectives                      Requirements
                                                                                                              2009
   Digital Circuit Design       Study of FPGA Design              Two PCs (laptops).
    preliminaries.                Approach.                         Serial port comm. Cables.
   Mobile Networks              Study of WiMAX Basics.            FPGA Starter Kit
    Fundamentals.                Hardware implementation of        Interfacing Modules
   Digital Communication         WiMAX PHY Layer.                  Wireless Modulators (in case
    Fundamentals.                System integration to              of wireless communication
                                  facilitate the communication       between the two parties).
                                  between two parties ((two
                                  PCs)

                                       THE RIGHT WAY TO YOUR CAREER
Presently, mobile communications
               UMTS Service Multiplexing                                                   have the lead in the digital
                                                                                           communications market or a very
                                                                                           advanced position. New services are
                                                                                           increasing due to the rapid growth in
                                                                                           the traffic volume and new users
                                                                                           demands. Thus, future mobile
                                                                                           communication systems will be
                                                                                           distinguished by high integration of
                                                                                           services, flexibility and higher
                                                                                           throughput. To meet these challenges
                                                                                           ƐƚĂŶĚĂƌĚŝnjĂƟŽŶ    ďŽĚŝĞƐŝŬĞ ƉƉ
                                                                                                                     ů ϯŐƉƉ
                                                                                                                         ϯŐ ŚĂǀĞ
                                                                                           selected the wideband code division
                                                                                           multiple access (WCDMA) and the
                                                                                           hybrid time division – CDMA as the
                                                                                           radio techniques for the universal
                                                                                               o
                                                                                           mobile telecommunication systems
                                                                                           (UMTS).

      Prerequisites                 Objectives                       Requirements
                                                                                                      2009
   Digital Circuit Design      Study of FPGA Design              Keyboard  LCD.
    preliminaries.               Approach.                         MIC and Speaker.
   Mobile Networks             Study of WCDMA Basics.            FPGA Starter Kit.
    Fundamentals.               Hardware implementation of        Interfacing Modules.
   Digital Communication        UMTS PHY Layer .
    Fundamentals.               System integration to
                                 facilitate the communication
                                 between two parties (Data
                                                      (
                                 and Voice)

                                      THE RIGHT WAY TO YOUR CAREER
The application of code division
    CDMA2000 Secure Communication                                                                    multiple access (
                                                                                                                     (CDMA) technology
                                                                                                     was introduced in cellular systems in
                                                                                                     the early 1990s with the de
                                                                                                                              development
                                                                                                     and commercialization of the IS-95
                                                                                                     standard. Since then, the technology
                                                                                                     has been widely deployed throughout
                                                                                                     the world, reaching the 180 million
                                                                                                     subscriber mark in late 2003. Since its
                                                                                                     commercialization, the CDMA
                                                                                                     technology has evolved from IS
                                                                                                       chnology                    IS-95 to
                                                                                                     CDMA
                                                                                                     CDMA2000 and beyond with
                                                                                                     significant enhan
                                                                                                                 enhancements in voice
                                                                                                     capacity, data speed, and network
                                                                                                     features. CDMA2000 is the 3G Radio
                                                                                                     Transmission Technology (RTT)
                                                                                                     proposal submitted by Telecoms
                                                                                                     Industry Association (TIA).




      Prerequisites                  Objectives                       Requirements
                                                                                                                 2009
   Digital Circuit Design      Study of FPGA Design               Keyboard  LCD or Serial Port
    preliminaries.               Approach.                           comm. cables (RS232).
   Mobile Networks             Study of CDMA Basics.              FPGA Starter Kit.
    Fundamentals.               Study of AES Encryption.           Interfacing Modules
   Digital Communication       Hardware implementation of
    Fundamentals.                the Reverse Traffic Channel
                                                      Channel.
                                System Integration to
                                 facilitate secure comm.
                                 between two parties
                                                parties.

                                      THE RIGHT WAY TO YOUR CAREER
Data that can be read and understood
               Advanced Data Encryption                                                          without any special measures is called
                                                                                                 plaintext or cleartext. The method of


                     Using FPGA
                                                                                                 disguising plaintext in such a way as to
                                                                                                 hide its substance is called encryption.
                                                                                                 Encrypting plaintext results in
                                                                                                 unreadable gibberish called ciphertext.
                                                                                                 You use encryption to make sure that
                                                                                                 information is hidden from anyone for
                                                                                                 whom it is not intended, even those
                                                                                                 who can see the encrypted data. The
                                                                                                 process of reverting ciphertext to itits
                                                                                                 original plaintext is called decryption.
                                                                                                 Cryptography is the science of using
                                                                                                 mathematics to encrypt and decrypt
                                                                                                 data. Cryptography enables you to
                                                                                                 store sensitive information or transmit
                                                                                                 it across insecure networks (like the
                                                                                                 Internet) so that it cannot be read by
                                                                                                                              b
                                                                                                 anyone except the intended recipient.



      Prerequisites                  Objectives                       Requirements
                                                                                                              2009
   Digital Circuit Design      Study of FPGA Design               Two PCs (Laptops).
    preliminaries.               Approach.                          Serial Port comm. cables.
   Information Theory          Study of Cryptography Basics.      FPGA Starter Kit.
    Fundamentals.               Study of AES DES and RC4
                                           AES,                     Interfacing Modules
   Digital Communication        Encryption Algorithms.
    Fundamentals.               Hardware implementation of
                                 Encryption Modules
                                              Modules.
                                System Integration to
                                 facilitate data security.

                                      THE RIGHT WAY TO YOUR CAREER
Mobile Home Automation
                                                                                                Home automation is a modern
                                                                                                technology that puts security and
                                                                                                convenience right into your own home. In
                                                                                                other words, home automation is a
                                                                                                system that gives homeowners the ability
                                                                                                to take charge and control electronic
                                                                                                devices even if they are not physically at
                                                                                                home. Many o us are amazed at high-
                                                                                                               of
                                                                                                tech gadgets and automated machines
                                                                                                highlighted in movie films. With today’s
                                                                                                technology, the things that we see in the
                                                                                                movies are no longer impossible. Imagine
                                                                                                this, if you happen to forget to turn off
                                                                                                your air conditioner. You can turn it off
                                                                                                with a home automation system even if
                                                                                                you are already at the office. You
                                                                                                wouldn’t even miss your favorite TV
                                                                                                series. You can record it even if you are
                                                                                                oceans away from your home.


      Prerequisites                  Objectives                         Requirements
                                                                                                             2009
   Digital Circuit Design      Study of FPGA Design                 Two Cellular Mobiles.
    preliminaries.               Approach.                            Mobile comm. cable.
   Mobile Networks             Study of Mobile Modem AT  AT-        FPGA Starter Kit.
    Fundamentals.                Commands Basics.
                                              Basics                  Sensors and Actuators.
   Digital Communication       Hardware implementation of           Interfacing Modules
    Fundamentals.                Mobile Interfacing Modules.
                                System Integration to
                                 facilitate communication with
                                 mobile to control the circuits.

                                      THE RIGHT WAY TO YOUR CAREER
Multimedia Steganography
                                                                                                    Nowadays, information is rapidly
                                                                                                    available through the Internet.
                                                                                                    Companies have the ability to
                                                                                                    communicate with a worldwide audience
                                                                                                    through the World Wide Web. So
                                                                                                    Information hiding techniques are
                                                                                                    received increasing attention due to the
                                                                                                    availability of multimedia and digital form
                                                                                                    objects and the need to present solutions
                                                                                                    to criminal copying and copyright
                                                                                                    problems. As we know, cryptography and
                                                                                                    Steganography have been known for
                                                                                                    many years. We can encrypt data, but it
                                                                                                    will be exposed while transferring. On the
                                                                                                    other hand, we can hide data into a
                                                                                                    common object, but if someone extracts
                                                                                                    it, he/she can get the information easily.
                                                                                                    Therefore, my idea is to apply bot of
                                                                                                                                    both
                                                                                                    them, so in case one gets the embedded
                                                                                                    stuff; s/he will face an encrypted data.




      Prerequisites                     Objectives                       Requirements
                                                                                                                 2009
   Digital Circuit Design         Study of Visual Basic .NET.        Two PCs (Laptops).
    preliminaries.                 Study of Cryptography Basics.      Serial Port comm. cables.
   Information Theory             Study different Encryption         Visual Basic .NET.
    Fundamentals.                   Methods and Steganography.
   Programming Fundamentals.      Software implementation of
                                    Encryption Modules.
                                   Software implementation of
                                    Data Hiding Modules.



                                         THE RIGHT WAY TO YOUR CAREER
Before the modern era, cryptography was

               Software Data Encryption                                                             concerned with message confidentiality
                                                                                                    (i.e., encryption) — conversion of messages
                                                                                                    from a comprehensible form into an
                                                                                                    incomprehensible one, and back again at
                                                                                                    the other end, rendering it unreadable by
                                                                                                    interceptors or eavesdroppers without
                                                                                                    secret knowledge (namely, the key needed
                                                                                                    for decryption of that message). In recent
                                                                                                    decades, the fie has expanded beyond
                                                                                                                   field
                                                                                                    confidentiality concerns to include
                                                                                                    techniques for message integrity checking,
                                                                                                    sender/receiver identity authentication,
                                                                                                    digital signatures interactive proofs, and
                                                                                                            signatures,
                                                                                                    secure computation amongst others.
                                                                                                             computation,
                                                                                                    ƐƐĞŶƟĂůLJ͕ƉƌŝŽƌ ƚŚĞ LJ
                                                                                                              ů       ƚŽ ĞĂƌů ϮϬƚŚ   ĐĞŶƚƵƌLJ͕
                                                                                                    cryptography was chiefly concerned with
                                                                                                    linguistic patterns. Since then the emphasis
                                                                                                    has shifted, and cryptography now makes
                                                                                                    extensive use of mathematics, including
                                                                                                    aspects of information theory,
                                                                                                    computational complexity statistics,
                                                                                                                     complexity,
                                                                                                    abstract
                                                                                                    abstrac algebra, and number theory.


      Prerequisites                     Objectives                       Requirements
                                                                                                                  2009
   Digital Circuit Design         Study of Visual Basic .NET.
                                                          .NET         Two PCs (Laptops).
    preliminaries.                 Study of Cryptography Basics.      Serial Port comm. cables.
   Information Theory             Study different Encryption         Visual Basic .NET.
    Fundamentals.                   Algorithms and their related
   Programming Fundamentals.       Statistical Tests
                                                Tests.
                                   Software implementation of
                                    Encryption Modules.
                                   Software implementation of
                                    Statistical Testing Modules.

                                         THE RIGHT WAY TO YOUR CAREER

Weitere ähnliche Inhalte

Was ist angesagt?

Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
ambitlick
 
Interop 2006 Las Vega
Interop 2006 Las VegaInterop 2006 Las Vega
Interop 2006 Las Vega
Bretjones
 
Mobile modes how to connect with mobile consumers - deck
Mobile modes  how to connect with mobile consumers - deckMobile modes  how to connect with mobile consumers - deck
Mobile modes how to connect with mobile consumers - deck
Ashmeed Ali
 
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
IDES Editor
 
TBIZ2011 - Juniper. Next Generation Data Center
TBIZ2011 - Juniper. Next Generation Data Center TBIZ2011 - Juniper. Next Generation Data Center
TBIZ2011 - Juniper. Next Generation Data Center
TechnologyBIZ
 

Was ist angesagt? (20)

Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
 
Challenge of Dynamic Body Area Networks
Challenge of Dynamic Body Area NetworksChallenge of Dynamic Body Area Networks
Challenge of Dynamic Body Area Networks
 
[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P
[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P
[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P
 
Communication
CommunicationCommunication
Communication
 
14 19
14 1914 19
14 19
 
ADAPTIVE
ADAPTIVEADAPTIVE
ADAPTIVE
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
Open Video Customer Presentation
Open Video Customer PresentationOpen Video Customer Presentation
Open Video Customer Presentation
 
Interop 2006 Las Vega
Interop 2006 Las VegaInterop 2006 Las Vega
Interop 2006 Las Vega
 
Inforev | VoiceChat
Inforev | VoiceChatInforev | VoiceChat
Inforev | VoiceChat
 
Communication and Networks
Communication and NetworksCommunication and Networks
Communication and Networks
 
Mobile modes how to connect with mobile consumers - deck
Mobile modes  how to connect with mobile consumers - deckMobile modes  how to connect with mobile consumers - deck
Mobile modes how to connect with mobile consumers - deck
 
Communication
CommunicationCommunication
Communication
 
Call Flow | Voice Chat & Make Friend
Call Flow | Voice Chat & Make FriendCall Flow | Voice Chat & Make Friend
Call Flow | Voice Chat & Make Friend
 
웹의 [자발성과 다양성] 대 [책임성과 신뢰성]을 부여할 수 있는 '기술과 정책'의 참여 모델에 관한 발표
웹의 [자발성과 다양성] 대 [책임성과 신뢰성]을 부여할 수 있는 '기술과 정책'의 참여 모델에 관한 발표웹의 [자발성과 다양성] 대 [책임성과 신뢰성]을 부여할 수 있는 '기술과 정책'의 참여 모델에 관한 발표
웹의 [자발성과 다양성] 대 [책임성과 신뢰성]을 부여할 수 있는 '기술과 정책'의 참여 모델에 관한 발표
 
Chapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over AtmChapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over Atm
 
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
 
TBIZ2011 - Juniper. Next Generation Data Center
TBIZ2011 - Juniper. Next Generation Data Center TBIZ2011 - Juniper. Next Generation Data Center
TBIZ2011 - Juniper. Next Generation Data Center
 
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop   costas kalogiros - tussle analysis examples dns-tcpSeserv workshop   costas kalogiros - tussle analysis examples dns-tcp
Seserv workshop costas kalogiros - tussle analysis examples dns-tcp
 
Digital Fast Track Series Overview Guide
Digital Fast Track Series Overview GuideDigital Fast Track Series Overview Guide
Digital Fast Track Series Overview Guide
 

Ähnlich wie Projects ideas

SMARCOS CNR Paper Workshop Distributed UI
SMARCOS CNR Paper Workshop Distributed UISMARCOS CNR Paper Workshop Distributed UI
SMARCOS CNR Paper Workshop Distributed UI
Smarcos Eu
 
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
Sofia Eu
 
Remote Collaboration Tools
Remote Collaboration Tools Remote Collaboration Tools
Remote Collaboration Tools
Videoguy
 
Mobile speech and advanced natural language solutions
Mobile speech and advanced natural language solutionsMobile speech and advanced natural language solutions
Mobile speech and advanced natural language solutions
Springer
 
Communication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBPCommunication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBP
Vincent Perrin
 
SMARCOS CNR Paper Engineering
SMARCOS CNR Paper EngineeringSMARCOS CNR Paper Engineering
SMARCOS CNR Paper Engineering
Smarcos Eu
 
Takeshi kato
Takeshi katoTakeshi kato
Takeshi kato
safaeinfo
 
Developing network-friendly-applications
Developing network-friendly-applicationsDeveloping network-friendly-applications
Developing network-friendly-applications
BlueVia
 
Scaling choreographies for the internet of the future
Scaling choreographies for the internet of the futureScaling choreographies for the internet of the future
Scaling choreographies for the internet of the future
choreos
 
Language Support For Fast And Reliable Message Based Communication In S...
Language  Support For  Fast And  Reliable  Message Based  Communication In  S...Language  Support For  Fast And  Reliable  Message Based  Communication In  S...
Language Support For Fast And Reliable Message Based Communication In S...
alanocu
 
Cooperation and Collaboration in Natural Command Language Dialogue.docx
Cooperation and Collaboration in Natural Command Language Dialogue.docxCooperation and Collaboration in Natural Command Language Dialogue.docx
Cooperation and Collaboration in Natural Command Language Dialogue.docx
donnajames55
 

Ähnlich wie Projects ideas (20)

SMARCOS CNR Paper Workshop Distributed UI
SMARCOS CNR Paper Workshop Distributed UISMARCOS CNR Paper Workshop Distributed UI
SMARCOS CNR Paper Workshop Distributed UI
 
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
 
Remote Collaboration Tools
Remote Collaboration Tools Remote Collaboration Tools
Remote Collaboration Tools
 
Mobile speech and advanced natural language solutions
Mobile speech and advanced natural language solutionsMobile speech and advanced natural language solutions
Mobile speech and advanced natural language solutions
 
Applying User-behavior to Bandwidth Adaptations in Collaborative Workspace Ap...
Applying User-behavior to Bandwidth Adaptations in Collaborative Workspace Ap...Applying User-behavior to Bandwidth Adaptations in Collaborative Workspace Ap...
Applying User-behavior to Bandwidth Adaptations in Collaborative Workspace Ap...
 
Communication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBPCommunication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBP
 
SMARCOS CNR Paper Engineering
SMARCOS CNR Paper EngineeringSMARCOS CNR Paper Engineering
SMARCOS CNR Paper Engineering
 
Takeshi kato
Takeshi katoTakeshi kato
Takeshi kato
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Developing network-friendly-applications
Developing network-friendly-applicationsDeveloping network-friendly-applications
Developing network-friendly-applications
 
Beelders Using Vision And Voice To Create A Multimodal Interface For Microsof...
Beelders Using Vision And Voice To Create A Multimodal Interface For Microsof...Beelders Using Vision And Voice To Create A Multimodal Interface For Microsof...
Beelders Using Vision And Voice To Create A Multimodal Interface For Microsof...
 
SMART GLOVE .pptx
SMART GLOVE                        .pptxSMART GLOVE                        .pptx
SMART GLOVE .pptx
 
Usability of input methods within mobile devices: A comparative study between...
Usability of input methods within mobile devices: A comparative study between...Usability of input methods within mobile devices: A comparative study between...
Usability of input methods within mobile devices: A comparative study between...
 
Towards the intranet of the future
Towards the intranet of the futureTowards the intranet of the future
Towards the intranet of the future
 
Scaling choreographies for the internet of the future
Scaling choreographies for the internet of the futureScaling choreographies for the internet of the future
Scaling choreographies for the internet of the future
 
GENBAND SBC article
GENBAND SBC articleGENBAND SBC article
GENBAND SBC article
 
HGR-thesis
HGR-thesisHGR-thesis
HGR-thesis
 
Language Support For Fast And Reliable Message Based Communication In S...
Language  Support For  Fast And  Reliable  Message Based  Communication In  S...Language  Support For  Fast And  Reliable  Message Based  Communication In  S...
Language Support For Fast And Reliable Message Based Communication In S...
 
IRJET - Gesture based Communication Recognition System
IRJET -  	  Gesture based Communication Recognition SystemIRJET -  	  Gesture based Communication Recognition System
IRJET - Gesture based Communication Recognition System
 
Cooperation and Collaboration in Natural Command Language Dialogue.docx
Cooperation and Collaboration in Natural Command Language Dialogue.docxCooperation and Collaboration in Natural Command Language Dialogue.docx
Cooperation and Collaboration in Natural Command Language Dialogue.docx
 

Mehr von Hossam Zein

Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Hossam Zein
 

Mehr von Hossam Zein (20)

the engins that power the future.
the engins that power the future.the engins that power the future.
the engins that power the future.
 
Options for optimizing combined cycle plants
Options for optimizing combined cycle plantsOptions for optimizing combined cycle plants
Options for optimizing combined cycle plants
 
Improve plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater controlImprove plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater control
 
01 nuclear energy_overview
01 nuclear energy_overview01 nuclear energy_overview
01 nuclear energy_overview
 
00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_vers00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_vers
 
LMFBR - Superphenix
LMFBR - SuperphenixLMFBR - Superphenix
LMFBR - Superphenix
 
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
 
امن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخاليةامن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخالية
 
Development of of power plants functionality
Development of of power plants functionality Development of of power plants functionality
Development of of power plants functionality
 
Estimating appliance and home electronic energy use
Estimating appliance and home electronic energy useEstimating appliance and home electronic energy use
Estimating appliance and home electronic energy use
 
3 things to consider when installing solar power at home
3 things to consider when installing solar power at home3 things to consider when installing solar power at home
3 things to consider when installing solar power at home
 
Planning and Zoning for Solar in North Carolina - Pandzsolar2014
Planning and Zoning for Solar  in North Carolina - Pandzsolar2014Planning and Zoning for Solar  in North Carolina - Pandzsolar2014
Planning and Zoning for Solar in North Carolina - Pandzsolar2014
 
sonnen solar tracker 1/2
sonnen solar tracker 1/2sonnen solar tracker 1/2
sonnen solar tracker 1/2
 
SolTrK_data_sheet solar control
SolTrK_data_sheet solar controlSolTrK_data_sheet solar control
SolTrK_data_sheet solar control
 
sonnen solar tracker 2
sonnen solar tracker 2sonnen solar tracker 2
sonnen solar tracker 2
 
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEBSMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
 
Solar Power Analysis and Design Specifications Houston solar
Solar Power Analysis and  Design Specifications Houston solarSolar Power Analysis and  Design Specifications Houston solar
Solar Power Analysis and Design Specifications Houston solar
 
Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD
 
multi mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOMEmulti mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOME
 
القبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMeالقبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMe
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Projects ideas

  • 1. 2009 Conclusion Project Ideas Eng. Sameh Shawky 1/1/2009
  • 2. Data Communication using WiMAX Communication is a process that allows organisms to exchange information by several methods. (PHY Layer Implementation) Implementation Communication requires that all parties understand a common language that is exchanged. There are auditory means, such as speaking, singing and sometimes tone of voice, and nonverbal, physical means, such as body language sign language, language, paralanguage touch, eye contact, paralanguage, or the use of writing. Here we implement a WiMAX PHY Layer to be used in the communication between two parties. Prerequisites Objectives Requirements 2009  Digital Circuit Design  Study of FPGA Design  Two PCs (laptops). preliminaries. Approach.  Serial port comm. Cables.  Mobile Networks  Study of WiMAX Basics.  FPGA Starter Kit Fundamentals.  Hardware implementation of  Interfacing Modules  Digital Communication WiMAX PHY Layer.  Wireless Modulators (in case Fundamentals.  System integration to of wireless communication facilitate the communication between the two parties). between two parties ((two PCs) THE RIGHT WAY TO YOUR CAREER
  • 3. Presently, mobile communications UMTS Service Multiplexing have the lead in the digital communications market or a very advanced position. New services are increasing due to the rapid growth in the traffic volume and new users demands. Thus, future mobile communication systems will be distinguished by high integration of services, flexibility and higher throughput. To meet these challenges ƐƚĂŶĚĂƌĚŝnjĂƟŽŶ ďŽĚŝĞƐŝŬĞ ƉƉ ů ϯŐƉƉ ϯŐ ŚĂǀĞ selected the wideband code division multiple access (WCDMA) and the hybrid time division – CDMA as the radio techniques for the universal o mobile telecommunication systems (UMTS). Prerequisites Objectives Requirements 2009  Digital Circuit Design  Study of FPGA Design  Keyboard LCD. preliminaries. Approach.  MIC and Speaker.  Mobile Networks  Study of WCDMA Basics.  FPGA Starter Kit. Fundamentals.  Hardware implementation of  Interfacing Modules.  Digital Communication UMTS PHY Layer . Fundamentals.  System integration to facilitate the communication between two parties (Data ( and Voice) THE RIGHT WAY TO YOUR CAREER
  • 4. The application of code division CDMA2000 Secure Communication multiple access ( (CDMA) technology was introduced in cellular systems in the early 1990s with the de development and commercialization of the IS-95 standard. Since then, the technology has been widely deployed throughout the world, reaching the 180 million subscriber mark in late 2003. Since its commercialization, the CDMA technology has evolved from IS chnology IS-95 to CDMA CDMA2000 and beyond with significant enhan enhancements in voice capacity, data speed, and network features. CDMA2000 is the 3G Radio Transmission Technology (RTT) proposal submitted by Telecoms Industry Association (TIA). Prerequisites Objectives Requirements 2009  Digital Circuit Design  Study of FPGA Design  Keyboard LCD or Serial Port preliminaries. Approach. comm. cables (RS232).  Mobile Networks  Study of CDMA Basics.  FPGA Starter Kit. Fundamentals.  Study of AES Encryption.  Interfacing Modules  Digital Communication  Hardware implementation of Fundamentals. the Reverse Traffic Channel Channel.  System Integration to facilitate secure comm. between two parties parties. THE RIGHT WAY TO YOUR CAREER
  • 5. Data that can be read and understood Advanced Data Encryption without any special measures is called plaintext or cleartext. The method of Using FPGA disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish called ciphertext. You use encryption to make sure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting ciphertext to itits original plaintext is called decryption. Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by b anyone except the intended recipient. Prerequisites Objectives Requirements 2009  Digital Circuit Design  Study of FPGA Design  Two PCs (Laptops). preliminaries. Approach.  Serial Port comm. cables.  Information Theory  Study of Cryptography Basics.  FPGA Starter Kit. Fundamentals.  Study of AES DES and RC4 AES,  Interfacing Modules  Digital Communication Encryption Algorithms. Fundamentals.  Hardware implementation of Encryption Modules Modules.  System Integration to facilitate data security. THE RIGHT WAY TO YOUR CAREER
  • 6. Mobile Home Automation Home automation is a modern technology that puts security and convenience right into your own home. In other words, home automation is a system that gives homeowners the ability to take charge and control electronic devices even if they are not physically at home. Many o us are amazed at high- of tech gadgets and automated machines highlighted in movie films. With today’s technology, the things that we see in the movies are no longer impossible. Imagine this, if you happen to forget to turn off your air conditioner. You can turn it off with a home automation system even if you are already at the office. You wouldn’t even miss your favorite TV series. You can record it even if you are oceans away from your home. Prerequisites Objectives Requirements 2009  Digital Circuit Design  Study of FPGA Design  Two Cellular Mobiles. preliminaries. Approach.  Mobile comm. cable.  Mobile Networks  Study of Mobile Modem AT AT-  FPGA Starter Kit. Fundamentals. Commands Basics. Basics  Sensors and Actuators.  Digital Communication  Hardware implementation of  Interfacing Modules Fundamentals. Mobile Interfacing Modules.  System Integration to facilitate communication with mobile to control the circuits. THE RIGHT WAY TO YOUR CAREER
  • 7. Multimedia Steganography Nowadays, information is rapidly available through the Internet. Companies have the ability to communicate with a worldwide audience through the World Wide Web. So Information hiding techniques are received increasing attention due to the availability of multimedia and digital form objects and the need to present solutions to criminal copying and copyright problems. As we know, cryptography and Steganography have been known for many years. We can encrypt data, but it will be exposed while transferring. On the other hand, we can hide data into a common object, but if someone extracts it, he/she can get the information easily. Therefore, my idea is to apply bot of both them, so in case one gets the embedded stuff; s/he will face an encrypted data. Prerequisites Objectives Requirements 2009  Digital Circuit Design  Study of Visual Basic .NET.  Two PCs (Laptops). preliminaries.  Study of Cryptography Basics.  Serial Port comm. cables.  Information Theory  Study different Encryption  Visual Basic .NET. Fundamentals. Methods and Steganography.  Programming Fundamentals.  Software implementation of Encryption Modules.  Software implementation of Data Hiding Modules. THE RIGHT WAY TO YOUR CAREER
  • 8. Before the modern era, cryptography was Software Data Encryption concerned with message confidentiality (i.e., encryption) — conversion of messages from a comprehensible form into an incomprehensible one, and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely, the key needed for decryption of that message). In recent decades, the fie has expanded beyond field confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures interactive proofs, and signatures, secure computation amongst others. computation, ƐƐĞŶƟĂůLJ͕ƉƌŝŽƌ ƚŚĞ LJ ů ƚŽ ĞĂƌů ϮϬƚŚ ĐĞŶƚƵƌLJ͕ cryptography was chiefly concerned with linguistic patterns. Since then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of information theory, computational complexity statistics, complexity, abstract abstrac algebra, and number theory. Prerequisites Objectives Requirements 2009  Digital Circuit Design  Study of Visual Basic .NET. .NET  Two PCs (Laptops). preliminaries.  Study of Cryptography Basics.  Serial Port comm. cables.  Information Theory  Study different Encryption  Visual Basic .NET. Fundamentals. Algorithms and their related  Programming Fundamentals. Statistical Tests Tests.  Software implementation of Encryption Modules.  Software implementation of Statistical Testing Modules. THE RIGHT WAY TO YOUR CAREER