2CJ Abate | Editor's LetterForward Progress |
10CJ Abate | HTML New Product News
|
19David Tweed | HTML Test Your EQ |
22Akshay Dhawan Sergio Biagioni | MCU-Based Altitude ControlAn IR Protocol for Helicopter CommandsThis article describes a microcontroller-based altitude controller for a model helicopter. The system uses an IR protocol that sends commands to the helicopter, a phototransistor network that measures altitude, a boom setup that constrains helicopter movement, and a spiking neural network that monitors sensory inputs and output throttle values. |
30Josh Davis Tomas Carvalho e Silva John Vaughn | Open-Source Hardware DevelopmentOpen-source hardware is more popular than ever. This article describes an Arduino- based data logger built to log data about bats' entry/exit behavior. The logger was designed and built using open-source hardware and software, contributed code, and hardware CAD files.Download: 270-Vaughn.zip |
38Larry Cicchinelli | DIY Function GeneratorYou can build a flexible function generator with multiple simultaneous outputs, direct digital synthesis, and a flexible menu that uses a four-line character LCD, a joystick, and a quadrature encoder. This generator's design includes a microprocessor and custom PCBs.Download: 270-Cicchinelli.zip |
Questions & Answers46Nan Price | Sensory InnovationAn Interview with Stephan LubbersStephan Lubbers enjoys sensing technology. He is a creative engineer and inventor whose designs often build on his need to monitor data and figure out how things work. Steve and I recently discussed some of his designs, his contest-entry process, his thoughts on the future of embedded technology, and what's currently happening on his workbench. |
The Consummate Engineer50George Novacek | Failure Mode and Criticality AnalysisFailure mode and criticality analysis (FMECA) is an important element of any design. It uncovers potential performance problems and helps you modify your design to prevent or mitigate problems. FMECA also verifies your finished product is safe and working as desired. |
Embedded Security54Patrick Schaumont | Embedded AuthenticationA Authentication is the process of credential verification. Embedded systems have many authentication applications, including detecting counterfeit modules and preventing firmware tampering and illegal access. This article examines some basic authentication methods and demonstrates an implementation on a PIC32 microcontroller.Download: 270-Schaumont.zip |
From the Bench60Jeff Bachiochi | Web-Based Tools for Energy EfficiencyA family of Wi-Fi devices enables you to use Web-based tools to control and monitor your electrical power outlets (and the devices they control). This application programming interface (API) can combine devices from many manufacturers into one cohesive application.Download: 270-Bachiochi.zip |
From the Archives70Steve Ciarcia Jeff Bachiochi | Gotcha!Alarming the Alarm SystemAlarm companies fall a little short if what you want is entry and exit printouts. Sure, they'll do them. But only at $20 a pop -- or the cost of a new system. So, what do you do? If you're Steve and Jeff, you add a little electronic sleuthing to the system. |
76 | Crossword Puzzle |
79 | Crossword Puzzle - Answers for Issue 269 |
80Saptarshi Das | Tech the FutureCan MoS2 Outperform Silicon? |
FTP Directory for INK 270 | |
---|---|
<<< Ink 269 |
Ink 271 >>> |
Main Index |
Author Index |