Joule Thief Steals In Favor Of Christmas

A lot of things tend to get stretched during the holiday season, like shopping budgets and waistbands and patience. This year, [Chris] is stretching the limits of both the mini breadboard and the humble 1.5 V LR44 coin cell with his joule thief-driven LED mini Christmas tree.

With the push of a micro momentary, the joule thief circuit squeezes enough power from an LR44 to boot an MSP430 microcontroller, which needs 1.8 V – 3.6 V. After boot, the micro takes control of the joule thief circuit and milks it whenever the voltage falls below 3.2 V. This tree may be small in stature, but it’s feature-rich. A push of the same momentary button cycles through four different light shows, ending with a medley of all four. Be dazzled after the break.

The code for this tiny tree, which features an awesome ASCII breadboard layout and schematic, is up on GitHub. [Chris] has it listed among a few other manageable bare-metal ‘430 projects that would be great for beginners at pure C. If that sounds like you, why not give yourself the gift of learning a new language?

We’ve seen some spirited ways of lighting LEDs, but doing it with candle power takes the fruitcake.

Continue reading “Joule Thief Steals In Favor Of Christmas”

There Are 10 Kinds Of Computers In The World

There’s an old joke that there are 10 kinds of people in the world. Those who know binary, those who don’t, and those who didn’t see a base three joke coming. Perhaps [Dmitry Sokolov] heard that joke because he’s built a ternary (base 3) computer. He claims it is the first one to be built in the last 50 years. You can see a video about the device below. There’s also a video of the device with a nixie tube output.

You may not think of it often, but bit is a contraction of binary digit, so a ternary computer doesn’t have those. It has trits. The CPU operates on 3 trit words and uses nothing but multiplexers as building blocks. Instructions use 5 trits, some of which are a two-trit opcode and a 3 trit address of one of the 13 registers. The allure of using ternary, by the way, is that you can represent more numbers in fewer bits — um, trits, rather.

Continue reading “There Are 10 Kinds Of Computers In The World”

Small Jet Engine Model From Students Who Think Big

We love to highlight great engineering student projects at Hackaday. We also love environment-sensing microcontrollers, 3D printing, and jet engines. The X-Plorer 1 by JetX Engineering checks all the boxes.

This engineering student exercise took its members through the development process of a jet engine. Starting from a set of requirements to meet, they designed their engine and analyzed it in software before embarking on physical model assembly. An engine monitoring system was developed in parallel and integrated into the model. These embedded sensors gave performance feedback, and armed with data the team iterated though ideas to improve their design. It’s a shame the X-Plorer 1 model had to stop short of actual combustion. The realities of 3D printed plastic meant airflow for the model came from external compressed air and not from burning fuel.

Also worth noting are the people behind this project. JetX Engineering describe themselves as an University of Glasgow student club for jet engine enthusiasts, but they act less like a casual gathering of friends and more like an aerospace engineering firm. The ability of this group to organize and execute on this project, including finding sponsors to fund it, are skills difficult to teach in a classroom and even more difficult to test with an exam.

After X-Plorer 1, the group has launched two new project teams X-Plorer 2 and Kronos. They are also working to expand to other universities with the ambition of launching competitions between student teams. That would be exciting and we wish them success.

Continue reading “Small Jet Engine Model From Students Who Think Big”

An Mbed In Your Browser

If you have dabbled in the world of ARM microcontrollers, you might be familiar with the Mbed platform, a software abstraction layer for a range of ARM-based small dev boards. If you don’t have an Mbed board but fancy giving it a go, you might imagine that you’d be out of luck, but [Jan Jongboom] could have an answer to your problem in the form of an Mbed simulation in your browser.

We’re not high-end ARM microcontroller developers here at Hackaday so beyond observing that it brings the Mbed abstraction layer binaries to the browser through the magic of Emscripten it’s best to point the curious at its GitHub repository. But we can see its attraction as a means to take a look at Mbed, and given that [Jan] describes himself as “a developer and evangelist currently working on the Internet of Things for ARM“, it’s safe to say this one comes as they say, from the horse’s mouth.

The Mbed board that is probably most famous is the education-focused micro:bit, but there are plenty of others on the market. Back in 2015 we published a getting started guide, if you are new to the Mbed.

Via Hacker News.

A Robot Arm For Virtual Beer Pong

Leave it to engineering students to redefine partying. [Hyun], [Justin], and [Daniel] have done exactly that for their final project by building a virtually-controlled robotic arm that plays beer pong.

There are two main parts to this build: a sleeve worn by the user, and the robotic arm itself. The sleeve has IMUs at the elbow and wrist and a PIC32 that calculates their respective angles. The sleeve sends angle data to a second PIC32 where it is translated it into PWM signals and sent to the arm.

There’s a pressure sensor wired sleeve-side that’s worn between forefinger and thumb and functions as a release mechanism. You don’t actually have to fling your forearm forward to get the robot to throw, but you can if you want to. The arm itself is built from three micro servos and mounted for stability. The spoon was a compromise. They tried for a while to mimic fingers, but didn’t have enough time to implement grasping and releasing on top of everything else.

Initially, the team wanted wireless communication between the sleeve and the arm. They got it to work with a pair of XBees, but found that RF was only good for short periods of use. Communication is much smoother over UART, which you can see in the video below.

You don’t have to have a machine shop or even a 3-D printer to build a robot arm. Here’s another bot made from scrap wood whose sole purpose is to dunk tea bags.

Continue reading “A Robot Arm For Virtual Beer Pong”

Mount Sopris

Design A Microcontroller With Security In Mind

There are many parts to building a secure networked device, and the entire industry is still learning how to do it right. Resources are especially constrained for low-cost microcontroller devices. Would it be easier to build more secure devices if microcontrollers had security hardware built-in? That is the investigation of Project Sopris by Microsoft Research.

The researchers customized the MediaTek MT7687, a chip roughly comparable to the hacker darling ESP32. The most significant addition was a security subsystem. It performs tasks notoriously difficult to do correctly in software, such as random number generation and security key storage. It forms the core of what they called the “hardware-based secure root of trust.”

Doing these tasks in a security-specific module solves many problems. If a key is not stored in memory, a memory dump can’t compromise what isn’t there. Performing encryption/decryption in task-specific hardware makes it more difficult to execute successful side-channel attacks against them. Keeping things small keeps the cost down and also eases verifying correctness of the code.

But the security module can also be viewed from a less-favorable perspective. Its description resembles a scaled-down version of the Trusted Platform Module. As a self-contained module running its own code, it resembles the Intel Management Engine, which is currently under close scrutiny.

Will we welcome Project Sopris as a time-saving toolkit for building secure networked devices? Or will we become suspicious of hidden vulnerabilities? The researchers could open-source their work to ease these concerns, but value of their work will ultimately depend on the fast-moving field of networked device security.

Do you know of other efforts to add hardware-assisted security to microcontrollers? Comment below or let us know via the tip line!

[via Wired]

Image of Mount Sopris, namesake of the project, by [Hogs555] (CC-BY 4.0)

 

Dumb Coffee Grinder Gets Smarter With Time

[Forklift] has a Rancilio Rocky, a prosumer-level coffee grinder that’s been a popular mainstay for the last few decades. It’s a simple machine with a direct-drive motor. Rocky has one job, and it will do that job in one of 55 slightly different ways as long as someone is pushing the grind button. What Rocky doesn’t have is any kind of metering technology. There’s no way to govern the grind length, so repeatable results rely on visual estimates and/or an external clock. Well, there wasn’t until [Forklift] designed a programmable timer from the ground up.

The timer interface is simple—there’s a D-pad of buttons for navigation through the OLED screen, and one button to start the grind. The left and right buttons move through four programmable presets that get stored in the EEPROM of the timer’s bare ATMega328P brain. Grind duration can be adjusted with the up/down buttons.

We like that [Forklift] chose to power it by piggybacking on the 240VAC going to the grinder. The cord through the existing grommet and connects with spade terminals, so there are no permanent modifications to the grinder. Everything about this project is open source, including the files for the 7-segment font [Forklift] designed.

Tea aficionados may argue that creating their potion is the more time sensitive endeavor. We’ve got you covered there. Only question is, one button or two?