Friday, 18 April 2014

WEEK 9

Title : ANALYSIS THE PROJECT

Making some plan and also analysis how project 
should be done:



Figure below show that i make some preparation for my presentation next week, i'm have study about relay and also about PIC 16F877A.



WEEK 8

Title : Briefing

- Second FYP Briefing for Degree Program
- The briefing is about to give some further explanation for the students who are taking the final project for Degree program since that the presentation day will be held 2 weeks from now. The briefing is about :
  • ·         Explanation of Final Year Project Calendar for S1’2014
  • ·         Presentation requirements
  • ·         Proposal requirements
  • ·         Final report requirements

Furthermore, students who are taking the FYP 1 for this semester have been briefed that the presentation will be included 30% from the progress of project but we also have been told that the progress is unnecessary to show on the presentation day.

Monday, 7 April 2014

WEEK 8

Title : Research and Findings ( Bluetooth classification and security)

BLUETOOTH RANGE

-There are three classes in Bluetooth which depends on the power that it needs to broadcast. The exact range of the Bluetooth broadcast depends on the surroundings.


Class 1 – 100 meters range with maximum permitted power set at 5mW.
Class 2 – 10 meters range with maximum permitted power set at 2.5mW.
Class 3 – 1 meter range with maximum permitted power set at 1mW.


BLUETOOTH SECURITY

-Security is important when communicating without wires. If your device is discover able, anyone in the vicinity can do a device discovery and find your Bluetooth device. They may determine which services your device is offering and try to connect to them. Another problem is eavesdropping, which can be done very easily when communicating without wires.

-In order to handle these threats, the Bluetooth specification defines a security model based on three components:
  • ·         Authentication
  • ·         encryption
  • ·         authorization

-In addition, three security modes are defined, enforcing different levels of security. A security manager is used to handle the security transactions in the Bluetooth system.

WEEK 7

Title : Redraw a block diagram

Doing some more research from the previous block diagram to identify the input, process and the output from the project. Helping from the supervisor is also included in making of the process.


PROBLEM SOLVING
Work and problem encountered :
-Supervisor gave some recommendation and suggestion to give some improvement for this block diagram. Therefore, I need to do more research on how reliable of this project to the society. Reliable means how far this project can overcome the problem of hackers out there that try to hack the coding system.

WEEK 7



Title :Research and findings


-Doing a research and list the requirement needed to meet the objectives.
- After making some research on the internet and guidance from the supervisor, I managed to get an idea, technique, and method to imagine my project flow. The first requirement needed to run the project is to identify the components. The componentsare :
  •        Bluetooth Module
  •       PIC
  •       Relay
  •      Solenoid
  •    Motor
  •     LED lamp
   The listed components below are just some illustrated images idea taking from the websites. 









-