Accompanying slides to my video blog.
What is opamp offset voltage? How to measure it?
See video: https://www.youtube.com/watch?v=DVYpzmfQ_r4
See my video blog: https://www.youtube.com/channel/UCtUcgFWvhZbknS5LxvfbMrw
The OPerational AMPlifier or OPAMP is a versatile analog Integrated Circuit (IC) that is capable of producing a very high gain.
An amplifier is a circuit that receives a signal at its input and delivers an undistorted larger
version of the signal at its output. The operational amplifier is a high gain amplifier to which feedback is added to control its overall response characteristic.
In closed loop connection, an external resistance is connected between the output and the negative (inverting) input terminal as a negative feedback. Here, the gain can be controlled by changing the values of the resistors.
The OPerational AMPlifier or OPAMP is a versatile analog Integrated Circuit (IC) that is capable of producing a very high gain.
An amplifier is a circuit that receives a signal at its input and delivers an undistorted larger
version of the signal at its output. The operational amplifier is a high gain amplifier to which feedback is added to control its overall response characteristic.
In closed loop connection, an external resistance is connected between the output and the negative (inverting) input terminal as a negative feedback. Here, the gain can be controlled by changing the values of the resistors.
This presentation contains the basic information you need to know about operational amplifier.
I have tried to cover all the basic info. If anything is left out or you have any suggestions i will appreciate it.
Accompanying slides to my video blog.
Constant current sources implemented with LM317 and LM7805.
See video: https://www.youtube.com/watch?v=zmrEXBHdSRo
See video blog: https://www.youtube.com/channel/UCtUcgFWvhZbknS5LxvfbMrw
This presentation contains the basic information you need to know about operational amplifier.
I have tried to cover all the basic info. If anything is left out or you have any suggestions i will appreciate it.
Accompanying slides to my video blog.
Constant current sources implemented with LM317 and LM7805.
See video: https://www.youtube.com/watch?v=zmrEXBHdSRo
See video blog: https://www.youtube.com/channel/UCtUcgFWvhZbknS5LxvfbMrw
Criterion Unacceptable Minimum Satisfactory Excellent Weight
Topic and Introduction The topic has little relevancy
in the specified area and no
problem statement and the
abstract did not give any
information about what to
expect in the report.
The topic has somewhat
relevancy and/or the
problem statement was
poorly constructed,
and/or the abstract
provides little information
on the project
Relevant topic is
selected and the
problem statement is
appropriately
constructed and/or the
abstract provides
adequate information on
the project
Relevant topic is selected and
the problem statement is well
constructed and the abstract
is concise and provides
adequate information on the
project
20
Score 0 7 17 20
Writing Quality The writing is incoherent,
broken, overly long, and
contains many spelling or
grammatical errors
The writing is incoherent,
lengthy, and has some
spelling or grammar
errors
The writing is coherent,
and only has a few
spelling or grammar
errors
The writing is coherent,
concise, free of spelling errors
and grammatically correct
10
score 0 5 8 10
Technical Accuracy Work is not accurate. Work has minimal
accuracy
Work is mostly accurate
with less than two minor
errors
Work is accurate and well
constructed 30
score 0 15 26 30
Clarity of Illustrations,
Diagrams or Charts
Figures, diagrams, tables
are sloppy, and/or not
accurate, and are not
labeled.
Figures, diagrams are
not especially clear, and
but labels and diagrams
are accurate.
Figures, diagrams,
tables are clearly drawn,
clearly labeled, accurate
Figures, diagrams, tables are
clearly drawn, clearly labeled,
accurate. Labels are
descriptive. Diagrams are
exceptionally detailed.
15
Score 0 8 12 15
Solution
& Conclusion Was not logically or
effectively structured and
presents an illogical
explanation for findings.
Needs greater effort to
make it a well-
constructed paper and
the findings were not
logically presented.
Were logically organized
and made good
connections among
ideas. Presents a
logical explanation for
findings.
Information is logically and
creatively organized with
smooth transitions. Presents
a logical explanation for
findings.
25
0 15 21 25
META RUBRIC FOR LAB REPORTS
G:\Online Course Management\SBT Meta Rubrics\Lab Report Meta Rubric.xlsx
ELEC 161 – Module 2 Laboratory - Page 1
ELEC 161 Electronics II
Module 2 Lab: Ideal vs. Real Operational Amplifiers
Introduction.- In this lab we will explore the real Operational Amplifier as opposed to the Ideal Op Amp. We
will study the different parameters that make Operational Amplifiers different across models and will measure
different types of Op Am ps.
Procedure
1.- Offset Voltage
Consider a voltage amplifier with a certain gain Av. We can write Vo = Av * Vin, so when Vin =0, then we expect
the out voltage (Vout) to b.
Ammeter is a low resistance galvanometer
It is used to measure the current in a circuit in amperes
Galvanometer can be converted into an ammeter by using a low resistance wire in parallel with the galvanometer
the resistance of the wire depends upon the range of the ammeter
As shunt resistance is small the combined resistance of the galvanometer & the shunt is very low hence the ammeter has much lower resistance than galvanometer
An ideal ammeter has zero resistance
It is the most common instrument used to measure voltage
It measure either AC or DC voltage
It is a measure of the voltage between two points of an electrical current
Accompanying slides to my video blog.
Design and build your simple logic probe using an LM358 Opamp.
See video: https://www.youtube.com/watch?v=WhPFS2u0V5o
See video blog: https://www.youtube.com/channel/UCtUcgFWvhZbknS5LxvfbMrw
My accompanying slides to my video blog.
This episode is about open source software and open source hardware.
See video: https://www.youtube.com/watch?v=5ynE_KbDaS0
See my Video Blog: https://www.youtube.com/channel/UCtUcgFWvhZbknS5LxvfbMrw
My intention for my new Video Blog centering around electronics design.
https://brainpoweredelectronics.blogspot.com/
or see my Video blog here: https://www.youtube.com/channel/UCtUcgFWvhZbknS5LxvfbMrw
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
#4 opamp offset voltage
1. #4 Opamp Offset voltage
Exploring the intrinsic properties of operational
amplifiers
2. What is opamp offset voltage?
Opamps are imperfect devices
Many properties define the performance
Input Offset voltage defines the voltage deviation from actual Voltage input
This can be seen as an intrinsic error source either by design or by fault
It is a major factor influencing accuracy and price
The error is usually found to be in the range of a few mV down to a few uV
Examples:
LM358 is a cheap and low power Opamp with a reasonable offset of about 2mV
3. What is opamp offset voltage? #2
Opamp ICs with more than one opamp element will
differ per opamp element
Some Datasheets show deviation frequency over a
large sample range (the cheap LM358 datasheet
does not illustrate this property)
However we can measure this offset with a simple
Circuit and a Multimeter with a mV range
4. Opamp Offset voltage measurement circuit
Opamp in voltage follower/Buffer mode
Bias the Non-inverting input to the middle of
the Supply Voltage (as depicted)
Measure the output with DMM (mV DC)
between the output and the Bias Voltage
(as depicted)
Good quality Multimeter is key, as
measurements would be very small
Ensure Supply (Vcc) Voltage well within the
operating range of the Opamp (LM358
9. Conclusion
LM358 Channel 1: 0.57mV
LM358 Channel 2: 0.94mV
This is well within the specified rating of 2mV in the Datasheet
Price
LM358: $0.44 (Digikey)
When interfacing with an ADC and an MCU, it is possible calibrate the offset out
in software
Some Opamps include an offset nulling adjust pin to calibrate in hardware