This presentation of CyberLab describes complete process that how can we use a mobile phone as a remote control by using DTMF Decoder IC on Second End. Complete circuit diagram and working process is given in slides.
Wireless network (cellular network architecture and http.)Abdullah Moin
Cellular architecture is constituted of the following − A network of cells each with a base station. A packet-switched network for communication between the base stations and mobile switching centres. The public switched telephone networks to connect subscribers to the wider telephony network.
In all cellular systems, land area is divided into a number of cells each with its radio service. In AMPS the area is large which in digital services, the area is much smaller. Conventionally cells are hexagonal in shape. Each cell uses a frequency range that is not used by its adjacent cells. However, frequencies may be reused in non-adjacent cells.
DESIGN & WORKING OF A MOBILE PHONE DETECTORpgayatrinaidu
This handy mobile bug or cell phone detector, pocket-size mobile transmission detector or sniffer can sense the presence of an activated mobile cellphone from a distance of one and-a-half metres. So it can be used to prevent use of mobile phones in examination halls, confidential rooms, etc. It is also useful for detecting the use of mobile phone for spying and unauthorised video transmission.
The circuit can detect both the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the bug detects RF transmission signal from an activated mobile phone, it starts sounding a beep alarm and the LED blinks. The alarm continues until the signal transmission ceases.
Wireless network (cellular network architecture and http.)Abdullah Moin
Cellular architecture is constituted of the following − A network of cells each with a base station. A packet-switched network for communication between the base stations and mobile switching centres. The public switched telephone networks to connect subscribers to the wider telephony network.
In all cellular systems, land area is divided into a number of cells each with its radio service. In AMPS the area is large which in digital services, the area is much smaller. Conventionally cells are hexagonal in shape. Each cell uses a frequency range that is not used by its adjacent cells. However, frequencies may be reused in non-adjacent cells.
DESIGN & WORKING OF A MOBILE PHONE DETECTORpgayatrinaidu
This handy mobile bug or cell phone detector, pocket-size mobile transmission detector or sniffer can sense the presence of an activated mobile cellphone from a distance of one and-a-half metres. So it can be used to prevent use of mobile phones in examination halls, confidential rooms, etc. It is also useful for detecting the use of mobile phone for spying and unauthorised video transmission.
The circuit can detect both the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the bug detects RF transmission signal from an activated mobile phone, it starts sounding a beep alarm and the LED blinks. The alarm continues until the signal transmission ceases.
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSShahrukh Javed
DESCRIPTION
Cell Phone Detector this handy, pocket-size mobile transmission detector can sense the presence of an activated mobile cell phone from a distance of one and-a-half meters.
The circuit can detect the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the Bug detects RF (radio frequency transmission signal from an activated mobile phone, it starts sounding a beep alarm and the LED blinks. The alarm continues until the signal transmission ceases. This project provides a simple circuit to detect the presence of an activated cell phone by detecting these signals.
NOTE Circuit will not detect if the mobile is switched off.
TEAM MEMBER
SHAHRUKH JAVED
SYED MOULA
For more log on to: http://shahrukhjaved.webs.com/apps/blog/
E-mial: shahrukh.tjit14@gmail.com
this is a simple way to help ambulance to reach hospital on time. this is just an idea . this will be ececuted if i am done with maximum number of queries .
BRIEF DESCRIPTION:
This simple touch sensitive alarm is developed by using NE-555 timer IC, operated as a monostable vibrator.
This touch alarm circuit will sound when somebody touches the trigger plate. Touch the sensing plate of the alarm with your finger and it starts beeping and then stops.
Touching it again and it goes again!
Here the stable stage is low, so the timer outputs low after the trigger is removed. Basically the circuit has a led which turns on when we touch a pin of timer. The led will be on for the time during which the trigger is present. Once the trigger is removed the led turns off.
This is a little and flexible circuit consists of a touch sensor and a NE-555 IC with a small buzzer as the output load. Two touch sensor strips of metal are mounted side by side & connected to the input of the circuit.
TEAM MEMBERS
1. SHAHRUKH JAVED
2. MOHAMMED MUZAFAR N
For more log on to: http://shahrukhjaved.webs.com/apps/blog/
E-mail: shahrukh.tjit14@gmail.com
What is DTMF Decoder , introduction , working of DTMF Decoder , block diagram of DTMF Decoder , components and Implementation of DTMF Decoder
Visit my Blog for more Education Material .Thanks
http://studyofcs.blogspot.com/search/label/Education
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSShahrukh Javed
DESCRIPTION
Cell Phone Detector this handy, pocket-size mobile transmission detector can sense the presence of an activated mobile cell phone from a distance of one and-a-half meters.
The circuit can detect the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the Bug detects RF (radio frequency transmission signal from an activated mobile phone, it starts sounding a beep alarm and the LED blinks. The alarm continues until the signal transmission ceases. This project provides a simple circuit to detect the presence of an activated cell phone by detecting these signals.
NOTE Circuit will not detect if the mobile is switched off.
TEAM MEMBER
SHAHRUKH JAVED
SYED MOULA
For more log on to: http://shahrukhjaved.webs.com/apps/blog/
E-mial: shahrukh.tjit14@gmail.com
this is a simple way to help ambulance to reach hospital on time. this is just an idea . this will be ececuted if i am done with maximum number of queries .
BRIEF DESCRIPTION:
This simple touch sensitive alarm is developed by using NE-555 timer IC, operated as a monostable vibrator.
This touch alarm circuit will sound when somebody touches the trigger plate. Touch the sensing plate of the alarm with your finger and it starts beeping and then stops.
Touching it again and it goes again!
Here the stable stage is low, so the timer outputs low after the trigger is removed. Basically the circuit has a led which turns on when we touch a pin of timer. The led will be on for the time during which the trigger is present. Once the trigger is removed the led turns off.
This is a little and flexible circuit consists of a touch sensor and a NE-555 IC with a small buzzer as the output load. Two touch sensor strips of metal are mounted side by side & connected to the input of the circuit.
TEAM MEMBERS
1. SHAHRUKH JAVED
2. MOHAMMED MUZAFAR N
For more log on to: http://shahrukhjaved.webs.com/apps/blog/
E-mail: shahrukh.tjit14@gmail.com
What is DTMF Decoder , introduction , working of DTMF Decoder , block diagram of DTMF Decoder , components and Implementation of DTMF Decoder
Visit my Blog for more Education Material .Thanks
http://studyofcs.blogspot.com/search/label/Education
ECE Projects for Final Year, Embedded Projects in Bangalore, Engineering Projects in Bangalore, Final Year Projects in Vijayanagar, ECE projects in Vijayanagar, Embedded Project institute in Vijayanagar
Aim of project is to make use of mobile phone to control robot movement
The movement is controlled by pressing relevant keys on a mobile phone that makes a call to another mobile phone attached to the robot.
Deceptive Marketing (also known as “dark Marketing”) are tricks used in websites and apps that
make you do things that you didn’t mean to, like buying or signing up for something. The purpose of
this site is to spread awareness and to shame companies that use these patterns.
How does Deceptive Marketing work?
When you use websites and apps, you don’t read every word on every page—you skim read and
make assumptions. If a company wants to trick you into doing something, they can take advantage
of this by making a page look like it is saying one thing when it is in fact saying another. You can
defend yourself by learning about deceptive marketing.
Types of Deceptive Marketing
Trick questions
While filling in a form you respond to a question that tricks you into giving an answer you didn’t
intend. When glanced upon quickly the question appears to ask one thing, but when read carefully it
asks another thing entirely.
This is very common when registering with a service. Typically a series of checkboxes is shown, and
the meaning checkboxes is alternated so that ticking the first one means “opt out” and the second
means “opt in”. Confusing language is often also used. Currys PC World provides a good example of
this on their checkout collection
BRAIN Computer Interface (BCI) is a technique that
provides direct interface between the human brain and the
computer. BCI techniques are broadly classified into
invasive and non-invasive techniques. Non-invasive
techniques are becoming more popular and more research is
being done on this topic. There are various non-invasive BCI
techniques such as EEG, Electro-Oculography. EEG technique
deploys an electrode cap that is placed on the user’s scalp for
the acquisition of the EEG signal, which relates the scalp
potential differences to various complex actions. Classification
of the EEG signal has been made into several bands like alpha,
beta, delta, theta and mu suppression, each corresponding to
various states of being like relaxing, ranging over 8-14 Hz;
concentrating, ranging over 13-30 Hz; deep sleep, from 0-4
Hz; meditating from 4-8 Hz; moving your hands or legs or just
by imagining these motor actions respectively. As it is being
non-invasive in nature, it has an advantage over traditional
BMI, not being hazardous to health. With the advent of
technology the EEG acquisition devices are made more
compact, handy and wireless. Using the above mentioned
technique, a simple thought controlled wheelchair system has
been proposed in this paper. A section that briefly explains the
various blocks included in the system is also added in this
paper
Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)Vivek chan
A mathematical model for the arc reactor which takes into account a. cooling and mixing of carbon vapour with a buffer
gas, b . non-isothermal kinetics of carbon clusters growth and c. formation of soot particles and heterogeneous reactions at
their surface has been developed. The model gives quantitative coincidence of experimental data with calculated values both
for the fullerene yield and ratio C70rC60 in the products of the arc synthesis run under widely varied conditions. Numerical
analysis of the model has shown that experimental data obtained for the arc synthesis strictly constrain the choice of the
mechanism of fullerene formation.
[Vivek Chan 2013]
EEG Acquisition Device to Control Wheelchair Using ThoughtsVivek chan
With the advancements in technology and health-care facilities, the number of senior citizens has increased and thus the number of elderly who find it difficult to walk. Hence there is a need for designing a wheelchair that is user friendly and involves fewer complexities. In this context, we propose a thought controlled wheelchair, which uses the captured signals from the brain and process it to control the wheelchair. This wheelchair can also be used by the physically challenged who depend on others for locomotion. Rehabilitation centers at hospitals can also make use of this wheelchair. In this paper, we explain the design and analysis of the thought-controlled wheelchair. In addition, we present some of the experiments that were carried out and the corresponding results in this paper.
http://www.vivek-chan.in
Vivek has his college degree in Computer Science and Engineering. With his strong background in Algorithms and Software Development, Web Development, Graphics Designing ,Internet Marketing, Cyber Security and also in Electronic security and Embedded systems in combination with his inter-personal skills and in-depth knowledge of current research in these fields.
http://www.vivek-chan.in
Vivek has his college degree in Computer Science and Engineering. With his strong background in Algorithms and Software Development, Web Development, Graphics Designing ,Internet Marketing, Cyber Security and also in Electronic security and Embedded systems in combination with his inter-personal skills and in-depth knowledge of current research in these fields.
http://www.vivek-chan.in
Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)Vivek chan
Ramcharitmanas (Devanāgarī: श्रीरामचरितमानस, IAST: ŚrīRāmacaritamānasa), also spelt as Ramacharitamanasa, is an epic poem in Awadhi dialect of Hindi, composed by the 16th-century Indian bhakti poet Goswami Tulsidas (c.1532–1623). Ramcharitmanas literally means "Lake of the deeds of Rama". Ramcharitmanas is considered as one of the greatest works of Hindi literature. The work has been acclaimed as "the living sum of Indian culture", "the tallest tree in the magic garden of medieval Indian poetry", "the greatest book of all devotional literature" and "the best and most trustworthy guide to the popular living faith of the Indian people".
The core of the work is considered by some to be a poetic retelling of the events of the Sanskrit epic Ramayana, centered on the narrative of Rama, the scion of the family tree of Raghu of the Sun Dynasty and the crown prince of Ayodhya who is also considered in Hindu tradition as one of the Avataras of Vishnu. However, Tulsidas never alludes to Ramcharitmanas as being a retelling of Valmiki Ramayana. He calls the epic Ramcharitmanas as the story of Rama was stored in the mind (Mānasa) of Shiva before he narrated the same to His consort Parvati. Tulsidas claims to have received the story through his guru, Narharidas. Tulsidas was unconscious (Acheta, Devanāgarī: अचेत) and the story was stored in his mind (Mānasa) for long before he wrote it down as Ramcharitmanas. The epic poem is, therefore, also referred to as Tulsikrit Ramayana (literally, The Ramayana composed by Tulsidas).
CyberLab Training Division :
The .NET Framework is Microsoft's Managed Code programming model for building applications on Windows clients, servers, and mobile or embedded devices. Microsoft's .NET Framework is a software technology that is available with several Microsoft Windows operating systems. In the following sections describes , the basics of Microsoft .Net Frame work Technology and its related programming models.
What is Microsoft .Net Framework
what are the functions of microsoft .net framework?
Common Language Runtime in .Net Framework
How to Common Language Runtime
What is .Net Framework Class Library
What is Common Language Specification
What is Common Type System
What is Microsoft Intermediate Language
What is Portable Executable (PE) File Format
What is Microsoft Just In Time Compiler
How to Managed Code - Microsoft .Net Framework
What is .Net Framework Metadata
what is .Net Framework Assembly
What is Assembly Manifest
What is Global Assembly Cache
What is a .Net Satellite Assembly?
What are the contents of an Assembly?
How to Private Assembly and Shared Assembly
What is Microsoft .Net Strong Name
What is .Net Namespaces
What is Application Domain
What is Code Access Security
What is Garbage Collection
.Net Threads
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
The .NET Framework is Microsoft's Managed Code programming model for building applications on Windows clients, servers, and mobile or embedded devices. Microsoft's .NET Framework is a software technology that is available with several Microsoft Windows operating systems. In the following sections describes , the basics of Microsoft .Net Frame work Technology and its related programming models.
What is Microsoft .Net Framework
what are the functions of microsoft .net framework?
Common Language Runtime in .Net Framework
How to Common Language Runtime
What is .Net Framework Class Library
What is Common Language Specification
What is Common Type System
What is Microsoft Intermediate Language
What is Portable Executable (PE) File Format
What is Microsoft Just In Time Compiler
How to Managed Code - Microsoft .Net Framework
What is .Net Framework Metadata
what is .Net Framework Assembly
What is Assembly Manifest
What is Global Assembly Cache
What is a .Net Satellite Assembly?
What are the contents of an Assembly?
How to Private Assembly and Shared Assembly
What is Microsoft .Net Strong Name
What is .Net Namespaces
What is Application Domain
What is Code Access Security
What is Garbage Collection
.Net Threads
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
The .NET Framework is Microsoft's Managed Code programming model for building applications on Windows clients, servers, and mobile or embedded devices. Microsoft's .NET Framework is a software technology that is available with several Microsoft Windows operating systems. In the following sections describes , the basics of Microsoft .Net Frame work Technology and its related programming models.
What is Microsoft .Net Framework
what are the functions of microsoft .net framework?
Common Language Runtime in .Net Framework
How to Common Language Runtime
What is .Net Framework Class Library
What is Common Language Specification
What is Common Type System
What is Microsoft Intermediate Language
What is Portable Executable (PE) File Format
What is Microsoft Just In Time Compiler
How to Managed Code - Microsoft .Net Framework
What is .Net Framework Metadata
what is .Net Framework Assembly
What is Assembly Manifest
What is Global Assembly Cache
What is a .Net Satellite Assembly?
What are the contents of an Assembly?
How to Private Assembly and Shared Assembly
What is Microsoft .Net Strong Name
What is .Net Namespaces
What is Application Domain
What is Code Access Security
What is Garbage Collection
.Net Threads
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
ASP.NET is a web application framework developed and marketed by Microsoft to allow programmers to build dynamic web sites. It allows you to use a full featured programming language such as C# or VB.NET to build web applications easily.
This tutorial covers all the basic elements of ASP.NET that a beginner would require to get started.
Audience
This tutorial has been prepared for the beginners to help them understand basic ASP.NET programming. After completing this tutorial you will find yourself at a moderate level of expertise in ASP.NET programming from where you can take yourself to next levels.
Prerequisites
Before proceeding with this tutorial, you should have a basic understanding of .NET programming language. As we are going to develop web-based applications using ASP.NET web application framework, it will be good if you have an understanding of other web technologies such as HTML, CSS, AJAX. etc
ASP.NET supports three different development models:
Web Pages, MVC (Model View Controller), and Web Forms.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
ASP.NET is a web application framework developed and marketed by Microsoft to allow programmers to build dynamic web sites. It allows you to use a full featured programming language such as C# or VB.NET to build web applications easily.
This tutorial covers all the basic elements of ASP.NET that a beginner would require to get started.
Audience
This tutorial has been prepared for the beginners to help them understand basic ASP.NET programming. After completing this tutorial you will find yourself at a moderate level of expertise in ASP.NET programming from where you can take yourself to next levels.
Prerequisites
Before proceeding with this tutorial, you should have a basic understanding of .NET programming language. As we are going to develop web-based applications using ASP.NET web application framework, it will be good if you have an understanding of other web technologies such as HTML, CSS, AJAX. etc
ASP.NET supports three different development models:
Web Pages, MVC (Model View Controller), and Web Forms.
For More Details.
Visit: http://www.cyberlabzone.com
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2. www.cyberlabzone.com
What is DTMF signal ?
The 12 keys on a cell phone ( 0,1,...,8,9,*,#)
has unique signal associated with itself. This
is DTMF signal.
When the call is on, the pressing of any
numerical key leads to generation of DTMF
signal which is audible on the other side.
3. www.cyberlabzone.com
DTMF TONE !!!
o Take any Nokia cell phone (others I haven't tested), turn on
keypad tones, press any key, the tone your hear is DTMF
tone.
Note: Don't confuse keypad tones with the tone that is heard on other side
while call is on. The tone heard on other side(while call is on) isDTMF
tone. Keypad tones can be different than DTMF tones (as in Samsung
that use Sa Re Ga Ma ... tone). It is just Nokia mobile manufacturer that
uses DTMF tones for keypad tones also.
4. www.cyberlabzone.com
How are DTMF tone generated?
The DTMF tone for each key is sum of two sinusoidal waves of frequencies
as given in following table. Thus each key has unique frequency pair and
thus unique DTMF tone. For example, DTMF tone for key 6 is sum of two
sunusodial waves of frequency 1477 Hz and 770 Hz.
The extra keys A,B,C and D are not present on cell phone. They are actually specially
used for special purposes. For example, public payphones that accept credit cards use
these additional codes to send the information from the magnetic strip.
Don't worry if you don't understand this part
!!!
1209H
z
1336H
z
1477H
z
1633H
z
697Hz 1 2 3 A
770Hz 4 5 6 B
852Hz 7 8 9 C
941Hz * 0 # D
5. www.cyberlabzone.com
Taking Input and Output from mobile…
Output can be taken from speaker ( that is near
to your ear while calling) and using microphone
to convert sound waves to electrical signals......
Complex Work….
The other way is through earphone jack.
6. www.cyberlabzone.com
3.5 mm Earphone Jack
Ground wire
One wire comes from the ground
terminal of the jack that is connected to
common ground of the complete circuit.
The other wire can be attached to any
one of two signal terminals.
7. www.cyberlabzone.com
DTMF Signal through cellular
NETWORK
The DTMF signals from source to
destination follow the same path
as that normal voice would have as
you normally talk on mobile
passing through many base stations
and even satellites in case of large
distances.
8. www.cyberlabzone.com
What do really mean when you say
WORD "SIGNAL" ?
It may confuse you or make your concepts more clear. You can
omit this topic.
Most people interpret signal as varying voltage. But this is not only the
case. Signal should be seen as piece of information and it may be
present in any form. It can be varying voltage ( as most of the cases
are ), varying currents, the pressure wave or sound wave ( audible
voice signals ), electromagnetic signals ( optical fibres ), etc
These forms are interchangeable to each other by use of some device.
For
example, microphone converts sound wave to voltage wave and
speaker the vice versa. LED converts voltage signal to
electromagnetic form. Photodiode converts light(electromagnetic
signals) to varying current signals.
DTMF signal doesn't means it is electrical signal or audible
voice signal( as intuition may guess ). It is combination of
two sinusoidal waves and sinusoidal waves may be present
in any form. Infact the DTMF signal starts with electrical
form on transmitter mobile, then encoded on
electromagnetic wave, then again converted to electrical
wave by receiver mobile and then to sound signal which is
audible.
11. www.cyberlabzone.com
8870 Functional Table
TOW( or TOE ) pin is enable pin
which make the IC active when
it is high. Note that in the circuit
diagram T0E(pin10) is connected
to 5 V (high). FLOW and FHIGH
represent the unique frequency
pair for each key.
You only need to know the
output 4 bit binary code for each
key. Note that output for key '0'
is not '0000'.
13. www.cyberlabzone.com
Points to note !!!
o You can use any mobile as transmitter.
o For receiver mobile, use mobile which has auto
answer capability ( most cell phones have ). I suggest
to get mobile with 3.5 mm jack( that one that is
available on Nokia Music Express series and on
desktop computer or laptop). The reason being the
easy availability of its connector.T
15. www.cyberlabzone.com
Points to note !!!
o For initial debugging and testing, you may connect four
bit output of 8870 IC to 7-Segment LED display through
7447 Decoder.
16. www.cyberlabzone.com
Conclusion
o One mobile is in your hand (cell 1) and other on the bot (cell
2). Cell 2 should be set to auto answering mode so that cell
2 automatically picks up the call. The earphone plug, 8870
DTMF decoder is connected to cell 2. You make a call from
cell 1 to cell 2. Cell 2 being in auto- answering mode picks up
the call. Now keypad of cell 1 acts as remote. As any key is
pressed on cell 1, the corresponding 4-bit output appears on
output pins of 8870 which can be further used.
17. www.cyberlabzone.com
IVRS
Now you have basic idea about how mobile can be manipulated
as remote. Here signals were sent only from one mobile to other.
Can you think of such things like other mobile responding by
sending back voice signal when some key is pressed. I mean
developing IVRS. Of course it requires some more knowledge and
thinking. You have learnt taking output from mobile. Find a way to
give it an input. And think from where input to mobile will come.
All others things, explore !!!