A schematic for a continuity tester that modulates its pitch based on the resistance measured

Op Amp Contest: Clever Continuity Tester Tells You Where The Problem Is

A continuity tester, as found on most multimeters today, is a great tool for finding broken connections and short circuits. But once you’ve found a short, it’s up to you to figure out which part of the circuit it’s in – a tedious job on a large PCB with hundreds of components. [John Guy] aims to ease this task with a continuity tester that modulates the beeper’s tone according to the resistance measured in the circuit. Tracking down a short circuit is then simply a matter of probing multiple points along a track and observing whether the pitch goes up or down.

The circuit is based on a single AD8534 quad op amp chip. The first stage measures the voltage across the circuit under test in response to small current and amplifies it. The resulting signal is fed into a voltage-controlled oscillator (VCO) made from one op amp connected as an integrator and another working as a comparator with hysteresis. Op amp number four amplifies the resulting square wave and drives a speaker. A low-pass filter makes the sound a bit more pleasing to the ears by removing the higher notes.

[John] paid particular attention to the PCB design to make it easy to assemble despite having a large number of SMD components on a small board. He even placed a parts list on the rear silkscreen, so anyone can assemble it even without the accompanying documents. The resulting board can be placed in a laser-cut acrylic case, turning it into a neat handheld instrument that will definitely find a place in any engineer’s toolbox. Measuring resistance through sound is not as accurate as using a full four-wire setup with an ohmmeter, but will be much faster and easier if you just want to find that annoying solder bridge hiding somewhere on your board.

Bust Out That Old Analog Scope For Some Velociraster Fun!

[Oli Wright] is back again with another installation of CRT shenanigans. This time, the target is the humble analog oscilloscope, specifically a Farnell DTV12-14 12 MHz dual-channel unit, which features a handy X-Y mode. The result is the Velociraster, a simple (in hardware terms) Raspberry Pi Pico based display driver.

Using a Pico to drive a pair of AD767 12-bit DACs, the outputs of which drive the two ‘scope input channels directly, this breadboard and pile-of-wires hack can produce some seriously impressive results. On the software side of things, the design is a now a familiar show, with core0 running the application’s high-level processing, and core1 acting in parallel as the rendering engine, determining static DAC codes to be pushed out to the DACs using the DMA and the PIO.

Continue reading “Bust Out That Old Analog Scope For Some Velociraster Fun!”

PUF Away For Hardware Fingerprinting

Despite the rigorous process controls for factories, anyone who has worked on hardware can tell you that parts may look identical but are not the same. Everything from silicon defects to microscopic variations in materials can cause profoundly head-scratching effects. Perhaps one particular unit heats up faster or locks up when executing a specific sequence of instructions and we throw our hands up, saying it’s just a fact of life. But what if instead of rejecting differences that fall outside a narrow range, we could exploit those tiny differences?

This is where physically unclonable functions (PUF) come in. A PUF is a bit of hardware that returns a value given an input, but each bit of hardware has different results despite being the same design. This often relies on silicon microstructure imperfections. Even physically uncapping the device and inspecting it, it would be incredibly difficult to reproduce the same imperfections exactly. PUFs should be like the ideal version of a fingerprint: unique and unforgeable.

Because they depend on manufacturing artifacts, there is a certain unpredictability, and deciding just what features to look at is crucial. The PUF needs to be deterministic and produce the same value for a given specific input. This means that temperature, age, power supply fluctuations, and radiation all cause variations and need to be hardened against. Several techniques such as voting, error correction, or fuzzy extraction are used but each comes with trade-offs regarding power and space requirements. Many of the fluctuations such as aging and temperature are linear or well-understood and can be easily compensated for.

Broadly speaking, there are two types of PUFs: weak and strong. Weak offers only a few responses and are focused on key generation. The key is then fed into more traditional cryptography, which means it needs to produce exactly the same output every time. Strong PUFs have exponential Challenge-Response Pairs and are used for authenticating. While strong PUFs still have some error-correcting they might be queried fifty times and it has to pass at least 95% of the queries to be considered authenticated, allowing for some error. Continue reading “PUF Away For Hardware Fingerprinting”

An aluminium case with a small PCB and two nine-volt batteries inside

A Low-Noise Amplifier To Quantify Resistor Noise

Noise is all around us, and while acoustic noise is easy to spot using our ears, electronic noise is far harder to quantify even with the right instruments. A spectrum analyzer is the most convenient tool for noise measurements, but also adds noise of its own to whatever signal you’re looking at. [Limpkin] has been working on measuring very small noise signals using a spectrum analyzer, and shared his results in a comprehensive blog post.

The target he set himself was to measure the noise produced by a 50 Ohm resistor, which is the impedance most commonly seen on the inputs and outputs of RF systems. The formula for Johnson-Nyquist noise power tells us that the expected noise voltage in a one-hertz bandwidth is just 0.9 nanovolts – tiny by any standard, and an order of magnitude smaller than the noise floor of a typical spectrum analyzer. [Limpkin] therefore designed an amplifier and signal buffer to crank up the noise signal by a factor of 100, using ultra-low noise op amps running off a pair of nine-volt batteries.

There was a problem with this circuit, however: any stray DC voltage present at its input would also be amplified to levels that could damage the analyzer’s sensitive input port. To prevent this, [Limpkin] decided to add a clipper circuit to his amplifier. This consists of a pair of comparators that continuously monitor the amplifier’s output voltage and disconnect it through a silicon switch if it goes beyond 200 millivolts. [Limpkin] packaged his circuit in a beautifully-machined case and ran various tests to ensure the clipper worked reliably even in the presence of fast input transients.

With the clipper in place, it was safe to run the planned noise measurements. The end result? About 0.89 nV, just as predicted by theory. Measuring nanovolt-level signals usually requires extremely accurate equipment and lots of tricks to minimize noise. Sometimes though, noise is just what you need to make a radio transmitter. Thanks for the tip, [alfonso32]!

Weird 555 Function Generator Uses Feedback

There are plenty of designs out there for sawtooth and triangle function generators, many of them using the humble 555 IC. Few are readily voltage controlled, making them difficult to work with using a DAC, though. Enter this useful design posted to EDN!

The nifty design allows both waveshape and amplitude to be controlled via voltage. You could hook up a couple of  potentiometers and call it done. Or, even better, you can control these parameters via PWM output from a microcontroller. Handy, no? It’s achieved by a fancy routing that sends feedback from the 555’s output pin to the CV input, instead of the usual design that uses the THR and TRG pins instead. The design also allows the production of both symmetrical and asymmetrical triangle waveforms, and as a bonus, the whole oscillator draws less than 4 mW of power.

If you’re looking for a nifty triangle/sawtooth generator that sits neatly in your otherwise-digital design, this could be for you. Or, you might like to explore the sheer mountain of other 555 hacks we’ve featured over the years. We even held a contest! If you’ve got new 555 hacks the world needs to see, don’t hesitate to drop them into the tipsline.

 

a flexible film with a matrix of illuminated color LEDs being stretched

Truly Flexible Circuits Are A Bit Of A Stretch

Flexible PCBs have become increasingly common in both commercial devices and DIY projects, but Panasonic’s new stretchable, clear substrate for electrical circuits called Beyolex takes things a step further. The material is superior to existing stretchable films like silicone, TPU, or PDMS due to its high heat tolerance (over 160° C) for the purposes of sintering printable circuit traces.

But, a flexible substrate isn’t very useful for electronics without some conductive traces. Copper and silver inks make for good electrical circuits on stretchable films, and are even solderable, but increase resistance each time they are stretched. Recently, a team out of the University of Coimbra in Portugal has developed a liquid metal ink that can stretch without the resistance issues of existing inks, making it a promising pair with Panasonic’s substrate. There’s also certain environmental benefits of printing circuits in this manner over traditional etching and even milling, as you’re only putting conductive materials where needed.

a flexible film with a strip of LEDs connected by a novel liquid metal ink circuit

After the break, check out Panasonic’s earlier videos showing some of their demo circuits that include a stretchable NFC antenna harvesting electricity even while submerged in water and an LED matrix performing while being, bent, rolled, and stretched. We’re excited to see where this technology leads and when we hackers will be able to create our own stretchable projects.

A great many flexible PCB projects have graced Hackaday, from early experiments to sophisticated flexible PCB projects. Heck, we had a whole Flexible PCB Contest with some awesome flexible projects.

Continue reading “Truly Flexible Circuits Are A Bit Of A Stretch”

PCIe For Hackers: Extracting The Most

So, you now know the basics of approaching PCIe, and perhaps you have a PCIe-related goal in mind. Maybe you want to equip a single-board computer of yours with a bunch of cheap yet powerful PCIe WiFi cards for wardriving, perhaps add a second NVMe SSD to your laptop instead of that Ethernet controller you never use, or maybe, add a full-size GPU to your Raspberry Pi 4 through a nifty adapter. Whatever you want to do – let’s make sure there isn’t an area of PCIe that you aren’t familiar of.

Splitting A PCIe Port

You might have heard the term “bifurcation” if you’ve been around PCIe, especially in mining or PC tinkering communities. This is splitting a PCIe slot into multiple PCIe links, and as you can imagine, it’s quite tasty of a feature for hackers; you don’t need any extra hardware, really, all you need is to add a buffer for REFCLK. See, it’s still needed by every single extra port you get – but you can’t physically just pull the same clock diffpair to all the slots at once, since that will result in stubs and, consequently, signal reflections; a REFCLK buffer chip takes the clock from the host and produces a number of identical copies of the REFCLK signal that you then pull standalone. You might have seen x16 to four NVMe slot cards online – invariably, somewhere in the corner of the card, you can spot the REFCLK buffer chip. In a perfect scenario, this is all you need to get more PCIe out of your PCIe.

Continue reading “PCIe For Hackers: Extracting The Most”