Sold as a bare-bones kit (sans the Atmel-basedArduino Uno which can be purchased here), the platform is regulated by Java software tasked with converting pictures into lines.
Essentially, the software sends the lines to the robot one at a time with GCODE. The robot leverages trigonometry to calculate the length of each belt.
Meaning, to move from point A to point B the robot determines the change in belt length and subsequently pulls the belts at the right speed to move in straight lines. Repeat 10,000 times and yes, you have a beautiful picture.
Currently available on Tindie at a $200 price point, kit contents include:
“To detect the proximity of the human hand or finger, we use the projected capacitive technique. This is the principle of virtually all modern touch screens – except that now we are in the air, relatively far away from the detector surface (10 cm max). So we build capacitors which are as ‘open’ as possible, using electrodes drawn on the electrode plane PCB in order to obtain a maximum ‘hand effect,’” 3Dpad creator Jean-Noël explained.
“[Meanwhile], the capacitors formed by the electrodes are part of an oscillator whose frequency is influenced by the distance of a hand. When it enters the electrostatic field, this ‘intruder’ is going to cut the field lines and divert the electrical charges. The closer the hand approaches the electrodes, the more the oscillator’s frequency increases.”
Recently, Jean-Noël told Bits & Pieces that Ootsidebox is working with Matlab to create a 3Dpad Arduino shield as a Simulink block.
“After a discussion we had with MathWorks, we decided to make the 3Dpad Arduino shield available as a Simulink block, downloadable from MATLAB central,” he explained.
“We are convinced that this solution, which enables graphical programing, is one of the best ways to learn and experiment with Arduino.”
In addition, says Jean-Noël, the Ootsidebox team is designing a MIDI controller for electronic music built around the 3Dpad.
“It will be based on 3Dpad shield + an Atmel-based Arduino Mega,” he added. “Making a ‘virtual percussion’ system with few 3Dpad synchronized sounds good!”
Rubik’s Cube is a 3-D combination puzzle invented in 1974 by Hungarian sculptor and professor of architecture Ernő Rubik.
Image Credit: Wikipedia
Originally dubbed the Magic Cube, the puzzle was licensed by Rubik to be sold by Ideal Toy Corp in 1980. According to Wikipedia, 350 million cubes had been sold worldwide as of January 2009 – making it the world’s top-selling puzzle game.
However, rather than using LEGO, matt2uv adopted more of a DIY approach with wooden skewers, popsicle sticks, an Atmel-based Arduino Uno board (ATmega328 MCU) and two servos.
On the software side, matt2uy leverages the Arduino IDE, Python 2.7+, Tkinter (GUI) and Pyserial.
The result? A DIY Rubik’s Cube ‘bot that takes 20 minutes to enter the cube state and solve.
“Wiring up the servos to the Arduino [is] pretty simple. Connect the yellow (signal) wires for the push and rotation servo to pin 6 and 9, respectively,” he explained in a recent Instructables post.
“Connect the positive and negative wires to the 5v power source and ground. Sometimes the servos had jitters, so I think capacitors could have smoothed out the signals.”
“[Essentially], this robot is an affordable, scaled-down model that is perfect for classroom based training on the mechanics and operations of a robot arm,” said Royer.
“[It boasts] three degrees of freedom – reaching up to 50cm away from its body. It runs on stepper motors and gearing for great precision. The lifting capacity is approximately 125g fully extended and 155g in a retracted position.”
Hillcrest Labs has announced that Coolpad Group (previously China Wireless) is using the company’s sensor hub software to enable “always on” sensing for Coolpad smartphones.
More specifically, Hillcrest’s Freespace software will run on Atmel’s low-power microcontroller (MCU) solutions to provide high performance sensor fusion, gesture recognition and always on context awareness capabilities – with dramatically lower power consumption and extended battery life.
“Coolpad realizes that sensors are critical to differentiate its functionality and maintain its dramatic growth in the global smartphone market,” said Chad Lucien, Senior Vice President of Sales and Marketing at Hillcrest Labs. “We’re proud to have been selected by Coolpad to provide the sensor hub functionality that will define its new mobile experience and enable context awareness, augmented reality, improved navigation and better gaming.”
As we’ve previously discussed on Bits & Pieces, sensor hubs are a separate class of chips designed to offload sensor management from the main processor for mobile phones and other devices. Essentially, they reduce the power requirements to add always on sensing in smartphones, tablets and wearables devices such as activity monitors, smartwatches, as well as head mounted displays (HMDs).
This enables gesture control, context awareness, pedestrian navigation, augmented reality, health and fitness monitoring, along with immersive gaming. Hillcrest’s sensor hub software products combine an array of sophisticated algorithms to provide low power, high performance sensor fusion and transform sensor data into valuable application-ready information.
Fortunately, the DIY project isn’t limited to just garage doors, allowing Makers and tinkerers to create various types of simple motorized locks by modding the initial Instructables.
Aside from Atmel’s ATtiny85 microcontroller (MCU), key project components include:
“The serial LCD kit sold by Sparkfun comes with an ATmega328 MCU to control the LCD. The ATmega has extra processing power to be used for other tasks besides controlling the LCD. Because of this, we can use it as an Arduino to communicate with the fingerprint scanner, send an ATtiny85 commands, control the LCD and use a buzzer to play tones,” nodcah explained in a detailed Instructables post.
“To prevent the module from running continuously, I’ve added a limit switch to detect when the case is closed. If it’s closed, power will not be supplied to it (saves battery power).”
After gathering the above-mentioned materials, drawing the circuit and assembling the serial LCD kit, nodcah builds the circuit boards, programs the ATmega328 and ATtiny85, configures the fingerprint scanner, writes the sketch and 3D prints a basic case.
“To open the garage door I wired my module to the button that normally opens the garage. Instead of a physical connection being made, the module uses a NPN transistor to ‘press’ the button. The wires should first be measured and cut to size, leaving a little extra wire just to be safe,” nodcah added.
“Then, the hard part: soldering the wires from the button to the FPS module. The wires should next be wrapped with a generous amount of tape. To get the signal from the ATmega outside of the garage to the ATtiny inside the garage, three wires (power, ground and signal) will need to be fed through the wall. On my garage, there was a piece of wood that I just drilled right through.”
Last, but certainly not least, nodcah notes that the module’s built-in enroll feature can be used to open the garage and create personalized messages for each profile.
As Julian Horsey of Geeky Gadgets reports, the wireless robotic hand faithfully reproduces the movements of an accompanying glove worn on another hand.
Aside from the above-mentioned Arduino boards, key project components include:
Shield to connect the Xbee module
Robot_Shield
5 Flex sensors
5 resistors: 47 KΩ
Battery pack with 3×1.5 V batteries
LilyPad FTDI adapter (optional)
A steel structure for the palm of the hand and wood for the fingers
5 servomotors
Fishing wires
9 V Battery
“To connect the servomotors I used the Robot_Shield from FuturaElettronica, which has also a switching regulator to power the entire circuit, but you can use any shield made for that,” Gabry25 explained in a recent Instructables post.
If we wanted to reduce the definition of authentication to its most Zen-like simplicity, we could say authentication is “keeping things real.” To keep something real you need to have some sort of confirmation of its identity, as confirmation is the key (so to speak).
The equation could be as follows:
Identification + Confirmation = Authentication
Confirming or validating the identity of a document, item, data, etc. is what keeping things real is all about. Some of the “things” that can be authenticated with cryptographic methods are mobile, medical, and consumer accessories; embedded firmware; industrial network nodes; and sensors, among others. Soon IoT and vehicle-to-vehicle communication will join in.
Authentication is far more important than many people realize, especially in our growing hyper-connected world that now links billions of people (and things). In cyber-land, authentication is accomplished by deploying cryptographic keys and algorithms. Keys are fundamental to keeping things real—so that is what we mean by “the key to reality.”
There are two primary types of Authentication: Symmetric and Asymmetric. Atmel offers secure key storage devices for both types. These two important techniques take their names directly from whether the keys on each side (i.e. the host and client sides) are the same or different.
Symmetric Authentication
If the same secret key is used on the client and on the host, then the application is symmetric, just like the name suggests. Both of the symmetric keys must be protected because if either one gets out then the security will be lost. This is perhaps analogous to having two sets of car keys. Meaning, losing either one makes it easy for a thief to drive away with your car. So, the secret keys must stay secret.
Symmetric Keys are the Same
The identical keys on the host and client are used in mathematical calculations to test the reality of client devices. A very common mathematical calculation that is used is a hash function based upon a cryptographic algorithm (such as SHA). A hash operation produces a hash value (also called “digest”), which is a number of a specified length that is usually smaller than the numbers used as the inputs. A hash is a one-way operation, which means that the inputs cannot be recreated from the hash value.
With symmetric authentication a typical process is to challenge the client device to be authenticated by sending it a random number. The client then puts the random number challenge and a secret key into the hash algorithm to create a hash value, which is known as the “response.” Each challenge will generate a unique response.
It should be noted that cryptographers call a hash of a random number with a secret key a “Message Authentication Code” or “MAC.” The diagram below illustrates this process. Because the host key is the same on the host and client sides, the exact same calculation can run on the host. Once that happens, the hash values (“MACs”) from each can be compared. If the hash values match, the client is considered to be real. You can see that symmetric authentication is really a simple process, but it is loaded with mathematical elegance. Now let’s look at asymmetric authentication.
Hashing a Random Number with a Secret Key
Asymmetric Authentication.
Asymmetric keys are presented in public-private pairs. More specifically, the public and private keys are related to each other via a mathematical algorithm. An example would be the Elliptic Curve Cryptography (or “ECC”) algorithm. Only the private key has to be securely stored. Because the keys are different, asymmetric authentication cannot use the same calculate-and-compare process as symmetric.
Asymmetric requires more complicated techniques such as making digital signatures that are verified for authenticity (this is called “Sign-Verify”). An example of asymmetric authentication using ECC algorithms is Elliptic Curve Digital Signature Algorithm (or “ECDSA”). A major benefit of the Atmel ATECC108A device is that it can be used to easily implement ECDSA sign-verify. (The steps of ECDSA are very interesting, but they will be covered in a separate article). Note that an important trade-off between symmetric and asymmetric authentication is the speed of operation. For example, authentication time for the Atmel ATSHA204A is 12ms (typical) for symmetric versus more than a second for many microcontrollers to execute an asymmetric ECDSA operation.
Getting back to the keys: The secret keys must stay secret.If keys are the keys to authentication (i.e. reality), then secure storage of the secret keys is the key to SECURE authentication. And that is the real point here.
So the, how is secure storage implemented? The best way is to use hardware key storage devices that can withstand attacks that try to read the key(s). Atmel CryptoAuthentication products such as the ATSHA204A, ATECC108A and ATAES132 implement hardware-based storage, which is much stronger than software based storage because of the defense mechanisms that only hardware can provide against attacks. Secure storage in hardware beats storage in software every time. Adding secure key storage is an inexpensive, easy, and ultra-secure way to protect firmware, software and hardware products from cloning, counterfeiting, hacking, as well as other malicious threats.
For more details on Atmel CryptoAuthentication products, please view the links above or the introduction page CryptoAuthentication. Future Bits & Pieces articles will take in an in-depth look at how symmetric and asymmetric authentication is accomplished.
The Microsoft Surface Pro 3 is a Surface-series Windows 8.1 tablet. Making its initial debut in May 2014, the first models began shipping on June 20, 2014.
The Surface Pro 3 features a 4th generation Intel Core processor, 12-inch display, multi-stage kickstand, redesigned type cover and a battery-powered Bluetooth pen.
WidgeDuino – which recently made its Kickstarter debut – is an intelligent and easily configurable Windows-based application for communication between a Microsoft Windows platform and a microcontroller based system such as an Atmel-basedArduino board.
Essentially, WidgeDuino communicates with the microcontroller system via serial protocol or TCP/IP.
“It allows simultaneous use of multiple widgets to create complete SCADA systems using simple WidgeDuino library written for [the Atmel-based] Arduino Uno,” WidgeDuino rep Shehzad Nazir explained.
“This includes, amongst others, keypad, LEDs, gauges, knobs, sliders, thermometers, tanks and buttons. Its intuitive approach to communication simplifies rapid prototyping and development of a complete automation system.”
More specifically, Widgeduino is based on Microsoft’s .NET framework, using the popular Visual Studio Windows Presentation Foundation (WPF) as its designer. It leverages National Instrument controls to enable the control of devices connected to the microcontroller system. As noted above, the app runs on a Windows system and supports both wired and wireless connections.
“Widgeduino comes with built-in APIs which facilitate addition of user-friendly widgets to embedded designs,” Nazir continued. “The libraries are primarily designed for communication with Arduino boards.”
Widgeduino offers two primary modes of operation:
Widgeduino over Serial: Serial based point-to-point (using RS232) or wireless point-to-multipoint (via Xbee 802.15.4) communication between the Widgeduino application and Arduino boards.
Widgeduino over Internet: IP based networking to enable Internet of Things (IoT). This mode can also be used as a hybrid (i.e. with Serial and IP protocol) to connect serial devices over internet with the Widgeduino app.
“Widgeduino simplifies the process of prototyping as it has multiple widgets that are very valuable in testing a design concept,” Nazir added.
“Once you finished with prototyping and testing with Widgeduino, you can use these widgets in your real SCADA system designs. Widgeduino provides a simple serial or ethernet interface to your microcontroller based designs, with a particular focus on Arduino boards.”
Examples of current (supported) WidgeDuino applications include: