Circuit Cellar Ink 270
January 2013

Table of Contents

2


CJ Abate

Editor's Letter

Forward Progress

10


CJ Abate

HTML New Product News

19


David Tweed

HTML Test Your EQ

22


Akshay Dhawan
Sergio Biagioni

MCU-Based Altitude Control

An IR Protocol for Helicopter Commands

This article describes a microcontroller-based altitude controller for a model helicopter. The system uses an IR protocol that sends commands to the helicopter, a phototransistor network that measures altitude, a boom setup that constrains helicopter movement, and a spiking neural network that monitors sensory inputs and output throttle values.

30


Josh Davis
Tomas Carvalho e Silva
John Vaughn

Open-Source Hardware Development

Open-source hardware is more popular than ever. This article describes an Arduino- based data logger built to log data about bats' entry/exit behavior. The logger was designed and built using open-source hardware and software, contributed code, and hardware CAD files.

Download: 270-Vaughn.zip

38


Larry Cicchinelli

DIY Function Generator

You can build a flexible function generator with multiple simultaneous outputs, direct digital synthesis, and a flexible menu that uses a four-line character LCD, a joystick, and a quadrature encoder. This generator's design includes a microprocessor and custom PCBs.

Download: 270-Cicchinelli.zip

Questions & Answers

46


Nan Price

Sensory Innovation

An Interview with Stephan Lubbers

Stephan Lubbers enjoys sensing technology. He is a creative engineer and inventor whose designs often build on his need to monitor data and figure out how things work. Steve and I recently discussed some of his designs, his contest-entry process, his thoughts on the future of embedded technology, and what's currently happening on his workbench.

The Consummate Engineer

50


George Novacek

Failure Mode and Criticality Analysis

Failure mode and criticality analysis (FMECA) is an important element of any design. It uncovers potential performance problems and helps you modify your design to prevent or mitigate problems. FMECA also verifies your finished product is safe and working as desired.

Embedded Security

54


Patrick Schaumont

Embedded Authentication

A Authentication is the process of credential verification. Embedded systems have many authentication applications, including detecting counterfeit modules and preventing firmware tampering and illegal access. This article examines some basic authentication methods and demonstrates an implementation on a PIC32 microcontroller.

Download: 270-Schaumont.zip

From the Bench

60


Jeff Bachiochi

Web-Based Tools for Energy Efficiency

A family of Wi-Fi devices enables you to use Web-based tools to control and monitor your electrical power outlets (and the devices they control). This application programming interface (API) can combine devices from many manufacturers into one cohesive application.

Download: 270-Bachiochi.zip

From the Archives

70


Steve Ciarcia
Jeff Bachiochi

Gotcha!

Alarming the Alarm System

Alarm companies fall a little short if what you want is entry and exit printouts. Sure, they'll do them. But only at $20 a pop -- or the cost of a new system. So, what do you do? If you're Steve and Jeff, you add a little electronic sleuthing to the system.

76

Crossword Puzzle

79

Crossword Puzzle - Answers for Issue 269

80


Saptarshi Das

Tech the Future

Can MoS2 Outperform Silicon?

FTP Directory for INK 270

<<< Ink 269

Ink 271 >>>

Main Index

Author Index