The “AlarmTock”, A Chumby Hacker Board Alarm Clock

[Thomas] wrote in to tell us about his latest project, the “AlarmTock”. Like many hacks, this was inspired by some outdated hardware, a radio alarm clock from 1992.

After finally getting fed up with his old alarm clock, [Thomas’] wife purchased him a new one for around $10 from a local retail store. Although most likely an improvement, [Thomas] wondered why after so many years he still had to listen to either an annoying “beep” sound or whatever song the DJ on the radio decided to play.

In true hacker form, he decided to do something about it. [Thomas] crammed a [Chumby Hacker Board], which has much of the same hardware as the [Chumby One] device, into his clock radio. RSS-driven text-to-speech was used to tell him exactly what he wanted to know every morning. A sample .wav file is provided as well as the python script used to execute his morning wakeup routine. For another fun hack from [Thomas] check out his Google treadmill hack here!

DIY Segway: Fast, Silent, And Open

This is a picture of the guts of a diy Segway project (translated). Everything fits into a tiny space under the platform upon which the rider stands. It’s tight, but makes for a sleek look when the diamond plate is covering up all of the internals.

An ATmega644 controls the vehicle. It does so by using a PID control scheme to monitor a gyroscope, driving the wheels to maintain the center of balance. Electronically, the most complicated part of the build is the motor controller. It seems to be an original design, using an ATmega48 and several other integrated circuits. It was hard for us to figure out how this was implemented, but with some intensive study of the three schematics that go into the module we’d bet you can get to the bottom of things. We certainly like the outcome, as this personal transport is whisper quiet. Take a look at the clip after the break to hear for yourself.

Note: Be careful if you’re reusing the code from the translated link at the top. Google translator also translates the variable names in the code and might break how it works due to inconsistencies in the translation.

Continue reading “DIY Segway: Fast, Silent, And Open”

High Voltage Hacks Finale: Do Not Try This Under Any Circumstances

Over the last two weeks, we’ve seen some pretty crazy and potentially dangerous stuff, like a stun glove and modern day alchemy. For our high voltage theme finale, we couldn’t pass up [Photonicinduction]’s YouTube channel.

Best known for his self-destructing washing machine (the source of this animated .gif), [Photonicinduction] is also the brainchild behind the hair dryer flame thrower and his homemade fifty thousand amp transformer.

While we do like his Not Safe For Work ammeter (yes, it really is NSFW), some of [Photonicinduction]’s videos – charging a car battery in 4 minutes, making a kettle boil without a heater element, pressurizing coconuts to over 200 psi, and exploding rabbits – are hilariously dangerous and should not be attempted by anyone.

We need to say you should not attempt to emulate [Photonicinduction]’s hijinks under any circumstances. Cleaning up a puddle of burning gasoline with a vacuum cleaner may sound like fun, but copying [Photonicinduction] will eventually get you killed. This man must know his stuff, because we’re honestly shocked he hasn’t exploded yet. The best way to enjoy three hundred thousand volts is probably grabbing a coffee and watching [Photonicinduction]’s YouTube channel.

Chumby Transplant And Hardware Upgrade Used With DSLR And WFT

The Chumby One comes in a nice little case and features an ARM powered board with a touchscreen interface. [Bobby] thought is was a good starting point, but wanted a more portable version to use as a wireless file transfer device for photography. WFT is a connectivity enhancement for digital cameras that allows pictures to be pushed to other devices over a wireless network.

In order to improve the portability of the hardware [Bobby] ditched the power-hungry WiFi adapter that comes with the device. The newer and more efficient USB dongle that he’s using as a replacement makes switching to a rechargeable camera battery a viable option. With the battery and dongle soldered to the board he ditched the rest of the hardware (save the touchscreen) and began work on his own enclosure. You can see the version above is just a little rough around the edges, he cut it by hand from the Google Sketchup design. But since he plans to make a few more copies of this hardware for friends he will probably use a service to laser cut those cases for him.

The new hardware needs drivers, and [Bobby] has lots of instructions on how to compile your own. This includes setting up the toolchain, compiling the kernel, as well as building the drivers themselves.

 

More POV Fan Message Hacking

[Zach’s] company is all about the safety and to reinforce those ideals they handed out POV display fans to each employee. “Being Safe is Cool”, get it? Gimmicky… yes, but now [Zach’s] got a tiny little POV fan to hack. Although he may not have known it, this isn’t the first time we’ve seen this hardware. These fans were handed out as a promotion at Black Hat a couple of years ago and prompted some reverse engineering action. The message is stored on an EEPROM and there’s even a female programming header that makes it easy to write reflash it with your own messages if you know how to craft the data.

This is where the two products diverge. The older project uses a serial connection and PonyProg to dump and data. [Zach] first tried using his Bus Pirate to dump the data but after having no success he grabbed his Arduino and managed to get the job done. Once the message encoding protocol was worked out, he wrote a sketch to flash the EEPROM. So if you can get your hands on one of these the work has already been done. See [Zach’s] custom messages in the video after the break.

But we’d like to see this taken to the next level. How about a wall-mounted device that waits for something, like an incoming email or tweet, then spins up the fan to display it?

Continue reading “More POV Fan Message Hacking”

Converting A Lame Tron Toy Into A Cool Halloween Costume Prop

sweet_souped_up_tron_identity_disc

Instructable user [cubeberg’s] daughter saw Tron:Legacy earlier this year and decided right then and there that she wanted to dress up as Quorra for Halloween. Being the awesome dad he is, he decided to make her costume himself, and hit the stores in search of an Identity Disc to complete the look.

The toy was pretty underwhelming, and lacked the lighting that a proper Tron prop should have. He figured he had the skills to make it a bit better, so he gathered some tools, a bunch of LEDs, and set off for his workshop. He gutted the disc, cutting out any extraneous bits of plastic he could find. He wired up 64 LEDs between the disc’s inner and outer ring, which he controls using an ATmega 328 paired with a Max7221 display driver.

He doesn’t show any pictures of what the toy looked like beforehand, but the final product looks great. We bet that his daughter is pretty pumped for Halloween to roll around – we know we would be.

Continue reading to see a quick video demo of his souped up Identity Disc in action.

Continue reading “Converting A Lame Tron Toy Into A Cool Halloween Costume Prop”

Vowel Recognition Using An ATmega644

[Youchun Zhang] and [Annie (Wei) Dai] found a way to differentiate vowel sounds using an ATmega644 as their final project for a microcontroller design class. Voice recognition is not out of the ordinary, but most of the time it uses a computer, smart phone, or specially designed hardware. This implementation uses an ATmega644, a microphone connected via an op-amp, and a few buttons. In the demonstration after the break you’ll see that they’re outputting status data to Putty via an RS232 connection, but that’s just so you can see what’s going on inside the chip. It’s what’s doing all of the hard work.

In order to tell the difference between vowels, the waveforms of each sound were analyzed using MATLAB during the research phase. That analysis allowed the team to assemble data for each sound that contained the peaks least often found in the other sounds. Now the microcontroller analyzes incoming sound, comparing it to that data set. The analysis is snappy, happening in real-time thanks to the team’s use of the Fast Walsh Transform. It turns the sound into a set of square waves and presents them as a 64 bit sample. The result can be used as a password protection scheme, but as far as we can tell this doesn’t key to just one person, anyone who knows the vowels of the password can use it.

Continue reading “Vowel Recognition Using An ATmega644”