Upload
trinhcong
View
215
Download
1
Embed Size (px)
Citation preview
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page1 of 12
A.V.C COLLEGE OF ENGINEERING, MANNAMPANDAL, MAYILADUTHURAI
Approved by AICTE, New Delhi, Affiliated to Anna University, Chennai
Accredited by NAAC with ‘B ‘Grade, An ISO 9001:2008 certified institution
Department of Electronics and Communication Engineering Accredited by NBA, NEW DELHI
“LEMON NEWSLETTER”
Volume: 01 Month: September’13 Issue: 02
Message from Head of the Department
I appreciate the faculty members for taking efforts in
conducting Faculty Development Program, Technical Seminar and
Guest Lecture Programs.
I congratulate both UG and PG ECE students who have won
various prizes in the oratorical contest and essay writing competition
conducted by the Rotary club of Mayuram.
I congratulate Mr.S.Senthilnathan, Assistant Professor, ECE,
who have presented a paper entitled “Clock Generation using Delay
Locked Loop with Dual control for PET /CT” held at CSIR-CEERI ,
Pilani.
CHITRAVALAVAN
HOD/ECE
Mind without fear
Where the mind is without fear and the head is held high
Where knowledge is free
Where the world has not been broken up into fragments
By narrow domestic walls
Where words come out from the depth of truth
Where tireless striving stretches its arms towards perfection
Where the clear stream of reason has not lost its way
Into the dreary desert sand of dead habit
Where the mind is led forward by thee
Into ever-widening thought and action
Into that heaven of freedom, my Father, let my country awake.
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page2 of 12
-Rabindranath Tagore
Faculty Corner:
OPTICAL CAMOUFLAGE TECHNOLOGY
A.P.Prabakaran.M.tech
(Asst.Professor / ECE)
What is an Optical Camouflage?
Optical Camouflage is a technology which allows an
object to blend into the surrounding using optical technologies
and has potential to achieve perfect concealment from visual
detection. It is a kind of active camouflage which completely
envelopes the wearer. It displays an image of the scene on the
side opposite to the viewer on it, so that the viewer can “see
through” the wearer, rendering the wearer invisible.
Light Surface Reflectivity:
In beaded surface the reflected light rays travel back along the
same path as the incident rays which is known as retro.
How does it work?
A digital video camera captures the scene behind the
person wearing the cloak. The computer processes the captured
image and makes the calculations necessary to adjust the still
image or video so it will look realistic when it is projected. The
projector receives the enhanced image from the computer and
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page3 of 12
shines the image through a pinhole-sized opening onto the
combiner. The silvered half of the mirror, which is completely
reflective, bounces the projected image towards the person
wearing the cloak. The cloak acts like a movie screen,
reflecting light directly back to the source, which in this case is
mirror. Light rays bouncing off of the cloak pass through the
transparent part of the mirror and fall on the user’s eyes.
Remember that the light rays bouncing off of the cloak contain
the image of the scene that exists behind the person wearing
the cloak. The person wearing the cloak appears invisible
because the background screen is being displayed onto the
retro-reflective material. At the same time, light rays from the
rest of the world are allowed to reach the user’s eye, making it
seem as if an invisible person exists in an otherwise normal
looking world.
Application:
Used in Stealth technology, to make airplane invisible
to Radar.
Doctor performing surgery could use optical
camouflage technique to see through their hands and
instruments to the underlying tissue.
Predator, Iron man, James Bond[die another day]
Movies and Video games.
----------------------------------------------------------------------------
Student Corner:
Famous Digital Camera Samsung
NX300
A.AnandaKumar-IV ECE
Pros
Open source licenses
Fast Autofocus
Sharp images even from kit lens
Great Wi-Fi connectivity
Touch screen is very responsive
Cons
Battery only charges in camera
Less than stellar battery life
Performance:
The NX300 is a real champ. The new hybrid autofocus
system works quickly and the variety of lenses make this
camera soar to the top of the charts.
Shooting Performance:
The Samsung NX300 has a quicker autofocus generally
taking a fraction of a second to capture it. Startup is also fast on
the NX300. It takes about a second to turn on the camera and
snap your first shot and the shutter lag is unnoticeable.
The NX300 comes with a hot shoe flash. It flips up for
use or flips down when you want to store it on your camera,
but not use it.The battery in the NX300 is rechargeable BP
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page4 of 12
1130 rated for 160 minutes of video or 320 shots. Also,
themore you use the Wi-Fi, the fewer shots you will be able to
capture. That handy little feature can eat up a lot of power.
Lens Performance:
The Samsung NX300 has a wide variety of lenses from
which to choose. Although I can't say the 18-55mm is my all-
time favorite kit lens ever, it does function very nicely with the
camera. It is highly responsive and is useful in a multitude of
photographic situations. But the best part is it produces some
pretty sharp images for a kit lens.
Wi-Fi/GPS:
I am happy to report that the Wi-Fi mode on the NX300
is easy and seamless. With no trouble at all, I accessed my Face
book account and downloaded 2 images in less than 10
seconds. After that, I tried again with 7 more images. Again,
each one took about 5 seconds to upload.
Video Quality:
Video is captured as an MP4 file. The camera records
Full HD 1080p at 60fps. It can also record 30fps or 24fps.
Sound is captured with in-camera stereo sound.
ImageQuality:
We were very impressed with our real world testing of
the NX300. Colors were well represented and came out
beautiful. Images are sharp with very little noise throughout
ISO 3200. ISO 6400 started to show noticeable noise.
Conclusion:
The Samsung NX300 really does earn the title of the
flagship NX mirror less camera. It offers a classic leatherette
skin draped over a sleek metal body. It is solid and sturdy--the
best made NX of the entire lineup. Its image quality is clean
and sharp, only giving way to serious pixel degradation at ISOs
above 6400.
The Wi-Fi functionality is simple to use and unable to
be beat by any other camera except for Samsung's own Galaxy
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page5 of 12
Camera. So far, no other camera company has been able to
create an easier Wi-Fi experience. This is great news for those
that desire great image quality and want to have their images
available on the web with the blink of an eye.
In addition to a great camera, Samsung is now
packaging the NX300 with Adobe Light room giving users
$150 worth of free software ($80 value if you already own a
previous version of Light room).
Near Field Communication
J.Vignesh-IV ECE
Near field communication (NFC) is a set of standards
for smart phones and similar devices to establish radio
communication with each other by touching them together or
bringing them into close proximity, usually no more than a few
inches. Present and anticipated applications include contactless
transactions, data exchange, and simplified setup of more
complex communications such as Wi-Fi. Communication is
also possible between an NFC device and an unpowered NFC
chip, called a "tag".
NFC standards cover communications protocols and data
exchange formats, and are based on existing radio-frequency
identification (RFID) standards including ISO/IEC 14443 and
FeliCa. The standards include ISO/IEC 18092and those defined
by the NFC Forum, which was founded in 2004 by Nokia,
Philips and Sony, and now has more than 160 members. The
Forum also promotes NFC and certifies device compliance. It
fits the criteria for being considered a personal area network.
Uses:
NFC builds upon RFID systems by allowing two-way
communication between endpoints, where earlier
systems such as contact-less smart cards were one-way
only.
It has been used in devices such as Samsung Nexus,
powered with Ice-cream Sandwich, named with a
feature called "Android Beam" which was first
introduced in Samsung Nexus.
Android Beam uses NFC to enable Bluetooth on both
devices, instantly pair them, and disable Bluetooth once
complete automatically on both devices. This only
works between Android devices version Jelly Bean and
above.
It has also been used in Samsung Galaxy S III, with
feature named as S-Beam. It is an extension of Android
Beam, it uses the power of NFC (to share MAC
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page6 of 12
Address and IP addresses) and then uses Wi-Fi Direct
to share file and docs. andpics.to share file.
The advantage of using Wi-Fi Direct over Bluetooth is
that it is much faster than Bluetooth, having a speed of
300Mbit/s for sharing large files Since unpowered NFC
"tags" can also be read by NFC devices, it is also
capable of replacing earlier one-way applications.
Commerce : Google Wallet allows consumers to store
credit card and store loyalty card information in a
virtual wallet and then use an NFC-enabled device at
terminals that also accept MasterCard Pay Pass
transactions. Germany, Austria, Finland, New Zealand,
Italy, and Turkey, have trialed NFC ticketing systems
for public transport.
Bluetooth and Wi-Fi connections:NFC offers a low-
speed connection with extremely simple setup, and can
be used to bootstrap more capable wireless connections.
technology to pair Bluetooth headsets, media players,
and speakers with one tap in its NFC-enabled devices.
The same principle can be applied to the configuration
of Wi-Fi networks. Social networking: NFC can be used in social
networking situations, such as sharing contacts, photos,
videos or files, and entering multiplayer mobile games.
in the field of social networking it is very useful to
exchange the contacts & other files.
Identity and access tokens:The NFC Forum promotes
the potential for NFC-enabled devices to act as
electronic identity documents and keycards. As NFC
has a short range and supports encryption, it may be
more suitable than earlier, less private RFID systems.
Smartphone automation and NFC tags:Smartphone
equipped with NFC can be paired with NFC tags or
stickers which can be programmed by NFC apps to
automate tasks. These programs can allow for a change
of phone settings, a text to be created and sent, an app
to be launched, or any number of commands to be
executed, limited only by the NFC app and other apps
on the Smartphone.
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page7 of 12
Comparison With Bluetooth:
E-BOMB
A WEAPON OF ELECTRICAL MASS DESTRUCTION
S.Natesan–III ECE
An electromagnetic pulse weapon emp is designed to
overwhelm the electrical circuitry with an intense
electromagnetic field. The principle of the vircator is that of
accelerating. A high current electron beam against a mesh (or
foil) anode. Many electrons will pass through the anode,
forming a bubble of space charge behind the anode. This space
charge region will oscillate at microwave frequencies. If the
space charge region is placed in to resonant cavity which is
appropriately tuned, very high peak powers may be achieved.
BOMB CAN BE DELIVERED THROUGH:
1. CRUISE MISSILE.
2. CONVENTIONAL AIRCRAFT.
3. AIR TO AIR MISSILE.
E-BOMB’S EFFECT:
Vehicle control systems.
Targeting systems, on the ground and on missiles
and bombs.
Communications systems.
Navigation systems.
Long and short-range sensor systems.
CONCLUSION:
Electromagnetic bombs are Weapons of
Electrical Mass Destruction with applications across a
broad spectrum of targets, spanning both the Strategic and
tactical. Because E-bombs can cause hard electrical kills
over larger areas than conventional explosive weapons of
similar mass, they offer substantial economies in force size
for a given level inflicted damage.
Aspect NFC Bluetooth Bluetooth
Low Energy
RFID compatible ISO 18000-3 active Active
Standardisation body ISO/IEC Bluetooth
SIG
Bluetooth
SIG
Network Standard ISO 13157 etc. IEEE
802.15.1
IEEE
802.15.1
Network Type Point-to-point WPAN WPAN
Cryptography not with RFID available available
Range < 0.2 m ~100 m (class
1) ~50 m
Frequency 13.56 MHz 2.4–2.5 GHz 2.4–2.5 GHz
Bit rate 424 kbit/s 2.1 Mbit/s ~1.0 Mbit/s
Set-up time < 0.1 s < 6 s < 0.006 s
Power consumption < 15mA (read) varies with
class
< 15 mA
(read and
transmit)
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page8 of 12
E-bombs can be an affordable force multiplier for
military forces which are under post-Cold War pressures to
reduce force sizes, increasing both their combat potential
and political utility in resolving disputes. it is incumbent
upon such military forces to appreciate both the offensive
and defensive implications of this technology. It is also
incumbent upon governments and private industry to
consider the implications of the proliferation of this
technology, and take measures to safeguard their vital
assets from possible future attack.
----------------------------------------------------------------------------
Find out the answers for the following
questions:
1. A 2MB PCM(pulse code modulation) has a) 32 channels
b) 30 voice channels & 1 signalling channel.
c) 31 voice channels & 1 signalling channel.
d) 32 channels out of which 30 voice channels, 1 signalling
channel, & 1 Synchronizatio channel
2. Time taken for 1 satellite hop in voice communication is
a) 1/2 seconds b) 1 seconds
c) 4 seconds d) 2 seconds
3. Max number of satellite hops allowed in voice
communication is :
a) only one b) more han one
c) two hops d) four hops
4. What is the max.decimal number that can be
accomodated in a byte.
a) 128 b) 256 c) 255 d) 512
5. Conditional results after execution of an instruction in a
micro processor is stored in
a) register b) accumulator
c) flag register d) flag register part of PSW
6. Frequency at which VOICE is sampled is
a) 4 Khzb) 8 Khz
c) 16 Khzd) 64 Khz
7. Line of Sight is
a) Straight Line b) Parabolic
c) Tx& Rx should be visible to each other
d) none
8. Purpose of PC(Program Counter) in a MicroProcessor is
a) To store address of TOS(Top Of Stack)
b) To store address of next instruction to be executed.
c) count the number of instructions.
d) to store base address of the stack.
9. What action is taken when the processor under execution
is interrupted by a non-maskable interrupt?
a) Processor serves the interrupt request after completing the
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page9 of 12
execution of the current instruction.
b) Processor serves the interupt request after completing the
current task.
c) Processor serves the interupt request immediately.
d) Processor serving the interrupt request depends upon the
priority of the current task under execution.
10. The status of the Kernel is
a) task b) process
c) not defined. d) none of the above.
(Answers in the next issue)
----------------------------------------------------------------------------
TECHNICAL PUZZLE
R.Abinaya-III ECE
Find and circle all of the Electronics related terms that are
hiddenin.the.grid. The remaining letters spell the name of a
common electronic component.
Answers for the questions asked in Issue: 01
Q.1. 2.7M /20% K
Q.2. Moves towards the conduction band
Q.3. To reduce diffusion constant
Q.4.All free charges get moved from the
Channel(VGS
=0)
Q.5.Holes and Electrons
Q.6.Zener Diode
Q.7.Voltage controlled Device
Q.8.Immobile charges
Q.9.Trigger Current
Q.10.Impact Ionisation
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page10 of 12
EDITORS DESK
Ten most important Organic Foods to Eat:
Baby Food - According to the National Academy of Sciences,
federal pesticide standards provide too little health protection.
Strawberries - A 1993 study by the Environmental Working
Group found that supermarket strawberries were the most
heavily contaminated fruit or vegetable in the US.
Rice - Water-soluble herbicides and insecticides have
contaminated the groundwater near rice fields.
Oats - In 1994, the FDA found illegal residues in a year's
worth of Cheerios from GM. Organic growers provide oats,
millet, quinoa, barley, couscous, amaranth, and spelt as healthy
options.
Milk - Dairy companies inject cows with recombinant bovine
growth hormone (rBGH). 79% of treated cows get clinical
mastitis, a common udder infection. Treating them with
antibiotics increases the change of residue in milk. (All milk
and dairy consumers beware: Starting on February 3, 1994,
milk, cheese, butter, ice cream, yogurt, beef and infant formula
sold and consumed throughout the United States will be laced
with genetically engineered recombinant Bovine Growth
Hormone (rBGH) - also known as "Bovine Somatotropin" or
BST. Recently, the U.S. Food and Drug Administration (FDA)
approved the use of rBGH in dairy cows without long-term
testing on the hormone's health effects on consumers..
The (FDA) has also refused to require labeling of milk
and other dairy products derived from use of the genetically
engineered hormone, even though more than 90% of
consumers favor labeling of rBGH products so they can avoid
buying them.)
Bell Peppers - The FDA found that in 1993, 38% of the
peppers from Mexico, which provides 98% of the US, had two
or more toxic pesticides.
Bananas - Costa Rica uses 35% of the country's pesticide on
banana crops.
Green Beans - 60 pesticides are used on green beans. 10% of
Mexican green beans are contaminated with illegal pesticides.
Peaches - FDA cited peaches for above-average rates of illegal
pesticide violations; 5% of the crop was contaminated.
Apples - 36 different pesticides have been detected by the
FDA. The fungicide captan and the insecticide chlorpyrifos
were among the 48 pesticides most frequently found in FDA
testing between 1984 and 1991.
LATEST ELECTRONICS MONTHLY NEWS /VOLUME: 01/ISSUE: 02 Page11 of 12
Obviously, it is worth your effort to find an organic
produce co-op or many large grocery chains are now offering
Organic produce.
It's not too late to eat smart. Eat Natural!
Send your suggestions to:
Mrs.K.R.Vinothini, AP/ECE –Editor / LEMON NEWSLETTER