Don't wanna be here? Send us removal request.
Text
What is Feedback and Feedforward control in Automotive?
Feedback control – The system output to adjust the system input by correcting errors and disturbances. For example: Cruise control system to maintain a constant speed by measuring the actual speed and comparing it with the desired speed. Feedforward control – The system input to predict the system output and feedback control systems is used to correct the prediction errors and ensure…
View On WordPress
0 notes
Text
Full Vehicle Testing – Cybersecurity verification and validation
Full Vehicle Testing – Cybersecurity verification and validation as part of the homologation process. UN R 155: Requirements for security validation ISO/SAE 21434: Validation activities at vehicle level ISO/ SAE 8477: To follow as dedicated standard for Cybersecurity verification and validation. Step 1: Initial Exploration (Organizational prerequisites, Logistical setup)    Before the…
View On WordPress
0 notes
Text
New Era of LLM - Generative AI
The CEO of Cognition Labs, Scott Wu, demonstrates in one video how users can monitor the AI tool’s code editor, workflow, and command line as it goes through several stages to finish data research and coding projects: Meet Devin AI Coding Assistant Devin is a Generative AI Coding Assistant developed by Cognition that can write and deploy codes of up to hundreds of lines with just a single…

View On WordPress
0 notes
Text
"The Future of IoT and Embedded Systems: Trends and Predictions for 2023"
This blog post will explore the current trends and predictions for the future of IoT and embedded systems in 2023. The post will cover various topics such as the increasing use of artificial intelligence and machine learning in embedded systems, the evolution of edge computing and its impact on IoT, the rise of 5G and its potential to revolutionize IoT, the growing importance of cybersecurity in…
View On WordPress
0 notes
Text
Difference between Software Verification and Validation
Software verification and validation are two important processes in software development that are often confused with each other. However, there are key differences between the two. Software Verification: Software verification is the process of evaluating software to determine whether it meets specified requirements and standards. This process involves checking the software’s design, code, and…
View On WordPress
0 notes
Text
Project - Controlling a DC motor using PWM and monitoring its Running status
AVR Bare Metal Programming - Using Simul IDE and Microchip Studio, We have created a project to Control a DC motor using PWM and monitoring its Running status
Overview of the Project: Implement a system on the simulator for controlling a DC motor using L293 motor driver, monitor its status and print the running status of motor on the LCD Display. Goals: Implement a system on simulator for Controlling the DC motor using L293 motor driver. Displaying the running status of DC motor on the LCD display. Key Highlights of the Project: The DC motor can…
View On WordPress
0 notes
Text
Interface LED and Push buttons to control output
Using Tinkercad Online simulation to interface LEDs and Pushbuttons to control LEDs using Arduino, LED, Pushbuttons, Wires, Resistors, Breadboard
Interface 2 LEDs as an output and 2 push buttons should be there to control those LEDs. If, both the push buttons are pressed at a moment, put off both the LEDs https://www.tinkercad.com/things/8Am4Fp7OODZ-amazing-densor-krunk/editel?sharecode=aIPQXt2Y-mgy-6w6mB3ywjLiPjOGeChf2nh1oOAdOSY Code : const int BUTTON1 = 2; const int BUTTON2 = 4; const int LED1 = 8; const int LED2 = 12; int…
View On WordPress
0 notes
Text
Identify value of unknown resistor using voltage divider circuit with Arduino
Using Tinkercad Online simulation and identify unknown resistor by using voltage divider circuit using Arduino, R1, R2, Wires, Breadboard.
Implement the code to determine the value of unknown resistor by voltage divider circuit which measures the input voltage using Arduino and display the value of unknown resistor on Serial Monitor Using Tinker cad and Arduino UNO and simulation code to identify the Ohm of unknown resistor using voltage divider…
View On WordPress
0 notes
Text
ARM Processor
Hey viewer! watch out ARM Processor - Cortex Family
An ARM processor is one of a family of central processing units (CPUs) based on the reduced instruction set computer (RISC) architecture for computer processors. ARM stands for Advanced RISC Machine. ARM architectures represent a different approach to how the hardware for a system is designed when compared to more familiar server architectures like x86. Acorn Computers first developed the ARM…
View On WordPress
0 notes
Text
Electric Vehicle History
Hi, Checkout my post!
In the late 1890s electric vehicles (EVs) outsold gasoline cars ten to one. EVs dominated the roads and dealer showrooms. Some automobile companies, like Oldsmobile and Studebaker actually started out as successful EV companies, only later did they transition to gasoline-powered vehicles. In fact, the first car dealerships were exclusively for EVs.Early production of EVs, like all cars, was…
View On WordPress
0 notes
Text
SAP - HANA (Most Used T - Code in Industry)
SAP – HANA (Most Used T – Code in Industry)
SAP HANA (high-performance analytic appliance) is an in-memory, column-oriented, relational database management system developed and marketed by SAP SE. Its primary function as the software running a database server is to store and retrieve data as requested by the applications. T CodeDescriptionMM01Material Item Code CreationMM02Material Item Code ChangeMM03Material Item Code DisplayME51NCreate…
View On WordPress
0 notes
Text
Cybersecurity Interview Q&A
What do you mean by Cybersecurity?
Cybersecurity is the combinations of process, practice’s and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access.
What do you have on your home network?
A home network gives you a test environment for experimentation. Active Directory Domain Controller, a dedicated Firewall appliance and…
View On WordPress
0 notes
Text
ORGANIZATION INFLUENCES AND PROJECT LIFE CYCLE
ORGANIZATION CULTURE:
It will direct influence on the success of the project
It Includes,
Value
Organization policies and procedure
Authority relationship view
Work ethics
Work hours
Organizations were classified under three common structure;
Functional Organization
Projective Organization
Matrix Organization (Weak/Strong/Balance)
Functional Organization:        “SILO”-Keyword in PMP
They…
View On WordPress
0 notes
Text
Embedded Hardware - Microcontroller
Embedded Hardware – Microcontroller
Microcontroller is a set of rules and regulation, which called a protocol. They are classified as Inter System Protocol and Intra System Protocol.Â
Inter System Protocol:Â
It communicates between two different devicesÂ
Example: UART, USART, USBÂ
 Inter System Protocol:Â
It communicates within circuit board elements.Â
Example:Â I2C, SPI, CANÂ
 UART: (Universal Asynchronous Receiver and…
View On WordPress
0 notes
Text
Embedded Hardware - Microcontroller
Embedded Hardware – Microcontroller
Microcontroller is a set of rules and regulation, which called a protocol. They are classified as Inter System Protocol and Intra System Protocol.Â
Inter System Protocol:Â
It communicates between two different devicesÂ
Example: UART, USART, USBÂ
 Inter System Protocol:Â
It communicates within circuit board elements.Â
Example:Â I2C, SPI, CANÂ
 UART: (Universal Asynchronous Receiver and…
View On WordPress
0 notes
Text
Li Ion Batteries
Battery Impedance Measurement:
Impedance depends upon chemical properties and mechanical design
Measured using frequency range 1Hz to 10MHz by injecting small current (Z=Vout/Vin)
At 1kHz Li Ion Cell of charging and discharged will show impedance of 68.6 milli ohms
If impedance is more then cell life cycle will be less.
Charger Control:
BMS help to control the charger to protect battery packs and…
View On WordPress
0 notes
Text
HackEra
Information security is the state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.
Information systems security is very important to help protect against this type of theft. Companies and organizations are especially vulnerable since they have a wealth of information from their employees. … The main focus of this…
View On WordPress
0 notes