Schematic | Circuit guide | Manual Wiring diagram | Electronic
Showing posts with label two. Show all posts
Showing posts with label two. Show all posts

there are two kinds of antennas of Cell Phone Jammers available

Posted by Unknown Thursday, January 9, 2014 0 comments
The accurate shielding can be performed to this kind of  Cell Phone Jammers 
Master receive eight data loopback acknowledge bit, but directly back to your one stop signal to complete a read operation immediately; select the read mode, the master device first sends a start signal from the device address, and finally read data; continuous mode immediately read or choose to read the expansion immediately read or read operation to obtain a byte of data in the implementation of the master device and back to your stop signal but back your an acknowledge bit to indicate that the main device more data are needed, then an orderly manner from the device subsequent bytes of data sent to the data online, know so far received the master device is given the stop signal. In the SCM system, the CPU is not only to achieve control of their own.
If successful after the completion of the CPU from the external character to take the program execution, if made to the program exceptions, it can lead to "watchdog" to reset both the program and from address 0 begin. The CPU reads the character through the parallel data and address lines and address lines, together with the read and write control clock line W / R, some readers may ask, font is how to distinguish between the program read, or read the data? Microcontroller with external program memory chip select signal line or the CS, CE, and the W / R role, you can allow the character to distinguish between read data or program. Phone all the software work processes are carried out under the action of the CPU, the specific division of the five processes described below. This is one of reflects that the quality assurance of  Cell Phone Jammers is productive.
These processes are in the form of a software data storage in the phone EEPROM and FLASHROM of in the process boot process. When the phones power supply module detects a power key is pressed, the cell phone battery voltage is converted to a voltage value for each part of the mobile phone circuit supplied to the power module, the clock circuit supply voltage after oscillation signal into the logic circuit, CPU voltage and clock signal, performs the boot process, first of all read from the ROM boot code, the implementation of the logical system self-test. And all of the reset signal is set high, if the self-test by the CPU given Watchdog (Watchdog) signal to each module. From the S60 phone has launched, Nokia can be said to deliver the largest section of the manufacturers. The testing cares about the product quality of Cell Phone Jammers .And there are two kinds of antennas of Cell Phone Jammers available
Through the infrared interface, the various types of mobile devices can be free to exchange data. Infrared electromagnetic waves of wavelengths between 750nm to 1mm, its frequency is higher than the microwave lower than that of visible light, a human eye can not see the light. Due to the shorter wavelength of the infrared obstacle diffraction poor, so more suitable for application in situations that require short-range wireless communication, point-to-point straight-line data transmission. Infrared Data Association (IRDA) to limit the scope of the wavelength of light used by the infrared data communication within the 850nm to 900nm. Mobile phones equipped with infrared interface for wireless Internet is very simple, do not need cable and PC CARD set up an infrared connection agreement will be able to direct Internet access.

Two button Digital Lock

Posted by Unknown Tuesday, December 24, 2013 0 comments
Now here’s a digital lock unlike any other, as  it has only two buttons instead of the usual  numeric keypad. The way it works is as simple  as its keypad. Button S1 is used to enter the  digits of the secret code in a pulsed fashion-i.e. the number of times you press the but-ton is determined by the digit to be entered.  A dial telephone uses the same type of coding (now maybe there’s an idea?). Press four  times for a 4, nine times for a 9, etc. Pressing button S2 indicates the end of a digit. 

 Two-button Digital Lock Project Image:

Two-button Digital Lock Project-Image 

For example, to enter the code 4105, press  S1 four times, then press S2, then S1 once, S2  once, then without pressing S1 at all, press S2  again, then finally S1 five times and S2 once  to finish. If the code is correct, the green LED D1 lights for 2 seconds and the relay is energised for 2 seconds. If the code is wrong, the  red LED D2 lights for 2 seconds, and the relay  is not energised. To change the code, fit a jumper to J1 and  enter the current code. When the green LED  D1 has flashed twice, enter the new 4-digit  code. D1 will flash three times and you will  need to confirm the new code. If this confirmation is correct, D1 will flash four times.  If the red LED D2 flashes four times, some-thing’s wrong and you’ll need to start all over  again. To finish the operation, remove the  jumper and turn the power off and on again the digital lock is now ready for use with  the new code.

Two-button Digital Lock Circuit diagram :
Two-button Digital Lock Circuit-diagram


The software can be found on the webpage for the project [1]. Don’t forget to erase the microcontroller’s EEPROM memory before  programming  it,  so  you  can  be  sure  that  the  default  code  is  1234  and  not  some -thing unknown that was left behind in the  EEPROM. A little exercise for our readers: convert this  project into a single-button digital lock for  example, by using a long press on S1 instead  of pressing S2 to detect the end of a digit.
 
Author : Francis Perrenoud  - Copyright : Elektor

Source : http://www.ecircuitslab.com/2012/02/two-button-digital-lock.html 

Current Limiter Circuit Using two transistors

Posted by Unknown Wednesday, April 10, 2013 0 comments
In many critical applications, circuits are required to maintain a strict controlled magnitude of current through them of at their outputs. The proposed circuit is exactly meant for carrying out the discussed function. The lower transistor is the main output transistor which operates the output vulnerable load and by itself is unable to control the current through it.

The introduction of the upper transistor makes it sure that the base of the lower transistor is allowed to conduct as long as the current output is within the specified limits. In case the current tends to cross the limits, the upper transistor conducts and switches OFF the lower transistor inhibiting any further passage of the exceeded current limit. The threshold current may be fixed by R which is calculated with the shown formula.