Creating the Verilog Top Module

This week the developing of the project headed toward new direction. Previously I was working mainly in the web development and Witty , starting from integrating the Codemirror with witty to extracting the user objects IDs (Check out my previous blog entries for more information ). This week the task was quite different in term of the language used šŸ˜€ . My task was simply to create the verilog top level module from the C++ code . The top level Read more…

Creating User Constraints

After the previous week has finished, this week we were back working on our first project. My task was to generate a UCF that will contain the wiring information. At the beginning of week, I had no idea what a UCF file is, nor how to generate it. Also, since the UCF will contain the wiring information, I had to modify my implementation of the schematic editor components, since they did not have ports, thus wires cannot be connected to Read more…

Final Progress

Well, I have finally finished the back bone of the back end. For the generation part, a certificate signing request is firstly being generated and being verified by the root certificate or another verified certificate. The certificate is then stored within folders which has certificate’s email name to ease the process of searching the certificates by searching the email. The certificates could then be revoked and then be placed in a separate “revoked” folder so that the search engine does Read more…

Verification Code

This week was not very productive, I have try to understand and figure out how to code this application and try to make the application stateless. The application require user to verify their email address before proceeding to the period selection page. Looking at this, the first question that i askedĀ  is how to verify the email address of the user? Thanks to Dr. Shawn I have found the hash Function in the Wt library and was able to hash Read more…

Improving Backend

This week I have focused on the part of generating a certificate out of the input passed by the front end ie the email and the number of days before the certificate has expired. The post request is firstly processed to separate the number of days and email from the string using stringstream. Then the common name required for the certificate input would be extracted from the email. The other subjects required for the certificate would be set into default. Read more…

Engineering Design

The task of this week was completely different. We were asked to do some engineering design work .The client company wants to build a device that has the following: CPU +Ā RAM SD card Wifi/GSM Camera Battery So our task was to pick up the suitable components based on the requirements given. The camera for example was requested to have a frame size of 800×600 and the ability to take 25 frame per second. The task was not easy as it Read more…

Embedded System Design

Doing an internship at a small company is significantly different that doing it at a multinational firm! This is my seventh week here at AESTE and I can honestly say that the experience you will find here is like no other. Let me rewind back to the start of this week to see what I mean. Before this week, we were generally doing programming. It was fun, and challenging, and we definitely learned so many things. Then we got an Read more…

New Application Flow

This week I did not did much of the coding of the application. Instead I did much on the planning of the flow plan and the screenshots to map out the whole process of the application. Previously I did the coding without thinking about the big picture of the whole application. Now that I have mapped out the whole application, I just have to follow the flow plan of the application. What is new in the application In this application, Read more…

Troubleshooting Quadcopter Communication

Continuing on from the long-standing attempts at hacking the quadcopter remote communication, a few methods were used to find out exactly why the communication wouldn’t work. These methods and the resulting outcomes are discussed in this week’s post. Non-functional NRF24L01+ modules:Ā  The 10 NRF modules acquired earlier seem to be not working even with the basic communication code that was used at the start of the project. This is a huge headache as there has been no change in the Read more…

Objects Unique IDs

Continuing the work of last week on user objects tracking, this week I started the implementation. The task for this week was to : Extract the object IDs from the user Code. Check if allĀ  IDs are unique or not. Form a list of IDs and object class name. Notify the user if any ID is repeated. As I mentioned last week , it was quite hard to come up with something unique that distinguishes each user’s declared object, so Read more…