Close or Esc Key

Electricity Anti-Theft System - Over Loading Detection and Automatic Shut Down

Contributor: 

Pawan Kumar

Electricity Anti-theft System Block DiagramElectricity theft is a common problem. Due to electricity theft, not only there are losses to the revenue of the government but over loading and damage to the transformers is an unwanted consequence of the theft as well. 

The project demonstrated here is to show the mechanism of electricity anti-theft system. A pack of parallel connected bulbs is used as load while the programmable circuit operating the supply controlling relay is based on Arduino. The principle used behind detecting overloading is voltage comparison and an additional buzzer circuit is attached to the project to alert electricity theft in the locality. The buzzer mechanism has been added to alert people of electricity theft and demoralize the mischievous elements.

Driving Toward a Greener Future

Written By: 

Sponsored Content

The road to zero-emission vehicles is paved with semiconductors. But the automobile is not a friendly environment: ICs face extreme voltages, currents, temperatures and vibration. Further, electric propulsion needs a battery rated in hundreds of volts, which challenges semiconductor materials, processes, designs, packages, and qualification. Managing the batteries of hybrids and full electric vehicles is a key area for innovative high-voltage technologies. Read more about it in the white paper ]]>“Driving the green revolution in transportation.”]]>

USB Requests and Stages of Control Transfer (Part 4/6)

Written By: 

Amanpreet Singh

In the previous article of this series, USB Descriptors were discussed. When a USB peripheral is connected to a host device, the host sends queries in the form of requests. The peripheral responds by sending Descriptors. The Descriptors contain the information required for identifying and configuring the peripheral device, implementing the interfaces and setting endpoints.

The device descriptor is the first descriptor sent to the host and it helps in configuring the peripheral with respect to the host. The subsequent descriptors implement the functioning, the peripheral is meant for. The Control Transfer is the only transfer type which is supported even when the device is yet not configured. That is the reason, it is used for sending requests and obtaining the descriptors. The default endpoint is endpoint 0 which is bidirectional and used for control transfers.

Biohacking Implants: Technology beyond Wearables

Submitted By: 

Neha Rastogi

Biohacking ImplantsBiohacking, as the term itself indicates, reflects a combination of biology and hacking. In this technology, the individuals can hack their bodies to achieve certain goals which may include improving the physical strength or boosting the brain memory. With the advancement in technology, Biohacking is getting popular each day. It administers the use of various methods like medical, nutritional, or even electronic techniques.

Intake of supplements, gene sequencing research in laboratories, wearable gadgets and body implants are all included in Biohacking. Although you all may know a lot about wearables as it has become too common, the body implants is still not known to the masses. So, let’s get an insight about the Biohacking implants and what difference will it make in the coming years

DC Motor Speed Testing Using Arduino

Contributor: 

AM Bhatt

DC Motor speed testing using arduinoIn DC motor speed testing, the PWM is applied to the motor and its duty cycle is varied from min to max. While applying PWM the actual RPM of DC motor is also measured and note down to see how motor speed (RPM) varies as PWM width varies. Along with this, the applied voltage to the motor is also measured to see the motor speed at different applied voltage.

Finally, after noting down all the values, the observation table is prepared for pulse width (duty cycle), applied voltage and motor speed in RPM. This table is used to prepare duty cycle->RPM graph or applied voltage->RPM graph of the motor.

Soil Moisture Detection with Automatic Water Pump Control and Real-time SMS Alert

Contributor: 

Pawan Kumar

soil moisture detectionFarming and Gardening are not trivial jobs. There are a range of crops and plants and numerous varieties of each plant or crop. Different plants and crops have different requirements of water, fertilizer and sunshine. The fertility of soil for any farming or gardening effort is usually judged by the level of nutrients and moisture in it.

A number of times the farmers or gardeners are not able to nourish the soil with sufficient fertilizer or water while at many times they just over do it. This project is to help farmers and gardeners keep a check of the soil health by real-time tracking the moisture level of their soil.

 

Automatic Missile Launcher with UDM RADAR

Contributor: 

AM Bhatt
As the name suggests, this is a demonstration of one military application in which the system automatically launches missile when any object is detected and it comes within the range. In actual system there is micro wave RADAR that detects any object and immediately fires missile to shoot the target. 
 
Here in given system it uses ultrasonic sensor to detect any object. The sensor scans complete 360o circle by rotating continuously and when it detects any object that is within 2 feet (60 cm) range, it launches the missile. It is build using AT89C51 micro controller. It also uses LCD to display a different message as well as the distance of an object.

The Amazing World of Robotics and its Promising Future

Submitted By: 

Neha Rastogi

As soon as we come across the word robot, we tend to imagine a metallic structure with arms and legs carrying a human-like appearance and running errands for our help. However, in actual terms, it’s just a machine operated externally or through a controller embedded within and doesn’t necessarily look like a human. Technically, robotics is a branch of Science and Engineering which deals with designing, constructing, and operating robots as well as computer systems for their control, sensory feedback, and information processing.

Interestingly, the concept is almost as old as the hills with the first robot dating back to 350 BC, built in the form of a mechanical bird, by a Greek mathematician named Archytas. Although the term was coined ages ago, the actual potential of the fully autonomous robotics was realised in the second half of the 20th century.

USB Descriptors and their Types (Part 3/6)

Written By: 

Amanpreet Singh

USB Descriptors and their TypesNow that we have discussed the basic details of USB including its features, architecture, and protocol, the next topic in the series is USB Descriptors. In context to USB interface, Descriptors are formatted blocks of information, through which, the host device learns about the peripheral. It helps in identifying and configuring the peripheral device.

A Descriptor contains information like type of the device, Vendor ID, Compliant USB Version, number of configurations device supports, number of endpoints, etc. The USB peripheral must respond with descriptors when requested by the host. During enumeration, the host uses control transfer to request the device for descriptors.

Raspberry Pi Internet of Things Demonstrator

Submitted By: 

Shalini Verma

Internet of things has the ability to assimilate small devices into much larger devices, once connected to the internet. This tutorial by Whaley geek demonstrates an easy method to connect hardware over the network by using two Raspberry Pi computers. As any small device is connected to the internet produces data which is already uploaded to the internet.

This data provides an opportunity to being analyzed on large servers, which are accessible on mobile apps or to send messages to other internet connected devices. In this tutorial, two Raspberry Pi computers are used to monitor a switch and to control an LED, connected via a local area network.