28 skills found
Timmeey86 / FS25 ToolInclinationHelperAn FS25 mod which shows how far your implements are from the ground and what their angle relative to zero is
Berg0162 / SimclineSimulation of Changing Road Inclination for Indoor Cycling
kanchudeep / Geomagnetism SwiftSwift class to calculate magnetic declination, magnetic field strength, inclination etc. for any point on the earth
dianjuar / SURF OpenCV InclinationIndentify an object by SURF algorithm using OpenCV and calculate the rotatinal angle of the object
microsoft / Bubble Level WpBubble Level is a simple Windows Phone example application demonstrating the use of accelerometer sensors to calculate the inclination of the device and presents this as a traditional bubble level.
BrettMontague / Directional Drilling CalculationsUse the minimum curvature method to perform the directional drilling calculations between two survey stations (Inclination / Azimuth /
tejakattenborn / AngleCAMA deep learning-based method to infer leaf angle variation from photographs.
EQTPartners / GenCeptionGenCeption is an annotation-free MLLM (Multimodal Large Language Model) evaluation framework that merely requires unimodal data to assess inter-modality semantic coherence and inversely reflects the models' inclination to hallucinate.
dcstechnoweb / The Reason Why Everyone Love Mining ToolsAs a rule, mining alludes to the birth of minerals and land accoutrements from the earth, from a gravestone or seal. moment different factors are mended by mining as similar accoutrements aren't developed, horticulturally handled, or misleadingly made. Superb models are precious essence, coal, precious monuments, and gold. Non-inexhaustible sources like ignitable gas, petrol, and indeed water are also booby-trapped. With the application of applicable mining tackle, the vigorous and worrisome undertaking of mining is achieved. Mining is the system involved in disengaging significant minerals and geographical accoutrements. typically, the minerals got from the mining system incorporate earth, coal, aspect gravestone, rock, gemstone, limestone, essence, potash, gemstone swab, and oil painting shale, and that is just the morning. As is generally said, whatever could not be developed through agricultural ways or made in a factory must be booby-trapped. Ever, indeed the birth of ignitable gas, oil painting, and other on-inexhaustible means are also acquired through mining. Mining is a sedulity that has been around for glories. it's been used on an outsized scale since neolithic times and contains long history. Mining makes use of technology so on urge the duty finished effectiveness and through a timely manner. There are numerous several mining tools that should be got used for the duty to be done duly. From the tricks of the trade to plenty of introductory, DCS Techno can give you a regard at completely different mining tools. for several years, the strategy for earning enough to pay the bills was by finding a replacement line of labour and dealing during a mine. Mining tools are a significant tool employed in creating a good kind of minerals from the planet. From the method of rooting minerals, they're also employed in a spread of consumer products. Mining Tools are utilized in the timber of buses, electronics, and jewellery. they're utilized in nearly every hand of society. Presently assuming that you just want to induce minerals from the planet, you need to have the correct apparatuses. Exercising proper and probative gear can make mining tasks more straightforward and more helpful. These are the foundation of any mining association so you should be careful while copping the needed effects. You can browse different tackle, with changing purposes and purposes, to do the errands hastily. Be open and feel free to this gear in the event that you realize it can help with expanding your tasks' effectiveness. The mining business has five significant sections coal mining, gas, and oil painting separating, essence mining, non-metal mining, and supporting exercises. Besides farther developing the exertion sluice, this tackle ought to likewise expand the degree of the well- being of the sloggers hard. As the owner, it's your obligation to take care of their musts. Pre-Historic Mining Early mortal progress has used the world's means through digging for a multifariousness of purposes. an outsized portion of the minerals and components mined in early times were utilized for the assembly of weapons and different devices. During these times, top-notch stone, which happens in masses of sedimentary rocks, was at that time pursued in pieces of Europe. They were utilized as weapons within that period of time. irrespective of the restricted mining gear, Neanderthal men had the choice to quarry and make ad-libbed instruments. Glancing back at history, specialists would affirm that metal and stone mining has been essential for everyday living since antiquated times. In our times, present-day techniques and hardware are being employed to formwork essentially simpler and increment usefulness. these days, the foremost common way of mining includes fundamental advances, recognizing regions where metal bodies are often gotten, dissecting its conceivable benefit, extricating the materials, and afterward recovering the land after the activity is finished up. Obviously, security could be a limitless need, particularly during the mining system itself. Working in such a setting is extremely hazardous thus security estimates should be painstakingly noticed. In view of their riches and influence, the antiquated Egypt civilization was one of the primaries to effectively mine minerals. They were accustomed mine is malachite and gold. The green stones were used for the foremost a part of stoneware and as trimmings. Later on, involving iron devices as mining hardware, they sought minerals, generally gold from Nubia. The stone containing the mineral is ready against a stone face to warm it and afterward drenched with water. Fire-setting was maybe the foremost well-known strategy for mining it slows ago. Mining predisposition is the stuff utilized in eliminating a wide bunch of minerals from the earth. Booby-trapped minerals are employed in enough important every paperback item from vehicles to attack, to gems and also some.These means are acquired using different feathers of mining instruments. Mining Tools are the outfit used in lodging a wide array of minerals from the earth. They range from the most introductory outfit, analogous as shovels and picks, to complex ministry, like drills and crushers. Booby- trapped minerals are used in nearly every consumer product — from motorcars, to electronics, to jewellery and further. They are employed to make everything from plastics to iPads and mobile phones. The mining business is formed out of assorted players, everyone with a basic job to create the work fruitful and compelling. most significantly, the general public authority handles the assignments of overseeing mineral cases moreover as giving investigation grants. Miners, then again, accomplish crafted by using topographical guides and other significant apparatuses to tell apart minerals. Junior investigation organizations are those accountable for testing stores for any attractive metals. Generally speaking, these organizations additionally own working mines. Then, significant mining organizations employ gifted people to accomplish the real work of mining. also flashed back for the rundown are the specialists. These experts handle sophisticated lab work and similar. Administration’s suppliers are likewise significant and they can come in colorful administrations, for illustration, geologists, copter aviators, instructors, and multitudinous others. Gear providers, development associations, assiduity confederations, and fiscal exchange fiscal backers also play their own corridor to satisfy to finish the advanced perspective. It was the Romans who made extraordinary advancements throughout the entire actuality of mining. They were the original bones to use enormous compass quarrying strategies, for illustration, the application of volumes of water to work introductory outfit, exclude trash, etc. This has come to be known as water-fueled mining or hydraulicking. This is a type of mining that utilizes high-constrained shocks of water to move jewels and other residue and detritus. During the 1300s, the interest in essence brands, coverings, and different munitions expanded drastically. further minerals, for illustration, iron, and tableware were extensively excavated. The interest to deliver coins also expanded with the eventual result of causing a lack of tableware. During this period, iron turned into an abecedarian part of structure developments; outfits and other mining gear came pervasive. from open-hole mining, water shops and dark greasepaint have developed into tractors, snares, exchanges, etc. Other mechanical advancements, for illustration, green light rays employed in mining as aphorism attendants and machine arrangements helped diggers with quarrying lands. Feathers of Mining Tools The mining sedulity has a wide compass of endlessly booby-trapping outfits. The mining business is a mind- boggling frame that requires an outfit that not just meets the particular musts of the mining business, yet likewise resolves the issues of the guests. thus, mining associations need gear like cherries on top, safeguards, sizers, the cherry on top pails, gyratory cherries on top, sway cherries on top, and jaw cherries on top. From-noteworthy bias, a huge outfit is presently used to successfully and incontinently uncover lands. These are also used to separate and exclude jewels, indeed mountains. Exceptionally designed gear presently helps in the birth of different precious minerals and other had relations with accoutrements like gypsum and swab. moment, there are as of now five classes of mining coal, essence, on-metallic mineral mining, oil painting, and gas birth. oil painting and gas birth stay to be maybe the topmost business in this present reality. Any intrigued fiscal backer or business person who needs to probe the mining business should communicate to the concerned neighbourhood government workplaces to get some information about the musts. By reaching out to these means, important data will be gotten and every one of the abecedarian advances will be illustrated. Poring the authority spots of mining associations can likewise be useful in realizing mining. Mining is a sedulity that has been around for prodigies. It has been employed on an outsized scale since neolithic times and contains long history. Mining utilizes invention to encourage the obligation to finish with acceptability and as soon as possible. There are colorful mining accoutrements that must be landed employed for the position to be done meetly. From the subtle strategies to a ton of early on, DCS Techno can offer you admire to completely unique mining instruments. From now onward, indefinitely quite a while, the system for making with the end result of dealing with the bills was by finding one more calling and working in a mine Mining instrument are a necessary outfit employed in making a wide multifariousness of minerals from the earth. From the system involved with establishing minerals, they're also employed in a multifariousness of client particulars. Mining Tools are employed in the timber of transports, tackle, and gems. They're employed in basically every hand of society. By and by awaiting that you need to get minerals from the earth, you should have the right bias. Mining inclination is the stuff employed in barring a wide bunch of minerals from the earth. Booby- caught minerals are employed inadequate important every softcover thing from vehicles to handle, to jewels and likewise some. also, minerals like uranium and coal are critical energy sources that record for half of the US's energy force. These coffers are gained exercising colorful awards of mining instruments. Mining Tools are the outfit employed in establishing a wide cluster of minerals from the earth. They range from the most starting outfit, relative as digging tools and picks, to complex tackle, analogous to drills and cherries on top. Booby- caught minerals are employed in nearly every buyer item from transports to widgets, to doodads and further. Mining Industry Overview Mining falls into two classes Surface mining and underground mining. The kind of minerals and mining ways that a mining trouble is trying to suppose will directly enlighten which instruments tractors use in their work. 1.Surface Mining This involves the mining of minerals located at or near the face of the earth. This are the six step processes and these are • Strip Mining- this involves the stripping of the earth's face by the heavy ministry. This system is generally targeted at rooting coal or sedimentary jewels that lay near the earth's face. • Placer Mining- this involves the birth of sediments in beach or clay. It's a simple, old- fashioned way of mining. This system is generally applicable to gold and precious gems that are carried by the inflow of water. • Mountain Top Mining- this is a new system that involves blasting a mountain top to expose coal deposits that lie underneath the mountain crest. • Hydraulic Mining- this is an obsolete system that involves jetting the side of a mountain or hill with high-pressure water to expose gold and another precious essence. • Dredging- it involves the junking of jewels, beaches, and ground underneath a body of water to expose the minerals. • Open hole- this is the most common mining system. It involves the junking of the top layers of soil in the hunt for gold or buried treasure. The miner digs deeper and deeper until a large, open hole is created. 2. Underground Mining This is the process in which a lair is made into the earth to find the mineral ore. The mining operation is generally performed with the use of underground mining outfits. Underground mining is done through the following styles • pitch Mining- it involves the creation of pitches into the ground in order to reach the ore or mineral deposit. This cycle is for the most part applied in coal mining. • Hard gemstone- this system uses dynamite or giant drills to produce large, deep coverts. The miners support the coverts with pillars to help them from collapsing. This is a large- scale mining process and is generally applied in the birth of large bobby, drum, lead, gold, or tableware deposits. • Drift mining- this system is applicable only when the target mineral is accessible from the side of a mountain. It involves the creation of a lair that is slightly lower than the target mineral. The graveness makes the deposit fall to the lair where miners can collect them. • Shaft system- this involves the creation of a perpendicular hallway that goes deep down underground where the deposit is located. Because of the depth, miners are brought in and out of the hole with elevators. • Borehole system- this involves the use of a large drill and high-pressure water to eject the target mineral. These are the introductory styles used in the birth of common minerals. There are more complex systems, but still, they're grounded on these abecedarian processes. To Know more information about Mining Tools Visit: dcstechno Contact us: Plot No 169, Road No.11, Prashasan Nagar, Jubilee Hills, Hyderabad, Telangana – 500096 +91-9849009875
wangbolun300 / RectifyingStripPatternsThis is an implementation of the paper "Rectifying Strip Patterns" (SIGGRAPH ASIA 2023). The code is to design rectifying strips with controllable inclinations on surfaces
LunaMultiplayer / TiltEmPlanetary axial tilt for KSP
nattsr / SRBDRP GrainSizeDistributionCodes to measure the grain size distribution from thin sections or µXCT images. The distribution can be calculated based on the sieve method (volume-based), the laser diffraction (frequency-based) method, or the point-count method. The code outputs are (1) grain centroid - a matrix of Cartesian coordinates for each grain, (2) grain radius – a matrix of the radii measured from the grain centroid for each grain, (3) grain azimuth, - a matrix of the azimuth of all principal axes, (4) grain inclination – a matrix of the inclination of all principal axes, (5) grain volume – a vector of the volume in voxels for each grain, and (6) the number of contacts - a vector of the number of adjacent grains in contact.
lilygrace454 / Mcafee.com ActivateThe Best Antivirus and Total Protection for Mac! What's the Best Malware Protection? Malware, Spyware, and Adware Protection Antivirus programming is basic for each PC. Without it, you hazard losing your own data, your records, and even the money from your financial balance. We've tried in excess of 40 utilities to enable you to pick the best antivirus security for your PCs. Malware, Spyware, and Adware Protection Summer is practically here, and we're all anticipating a stunning get-away, be it at the shoreline, in the mountains, or even on a journey. Malware coders get-aways, as well. Theirs is an occupation, similar to some other, from numerous points of view. In any case, that doesn't mean you'll be sheltered from infections, ransomware, bots, and other malware this late spring. The malware office director timetables get-aways, much the same as any office supervisor, to ensure someone's at work, making new assaults on your gadgets and your information. Before you head out, check your antivirus membership to ensure it won't take its very own get-away soon. In case you're not ensured at this point, put introducing an antivirus on your agenda. We've tried and McAfee com activate antivirus instruments so you can pick one and unwind with no stresses. We call it antivirus, yet in truth it's far-fetched you'll get hit with a real PC infection. Malware nowadays is tied in with profiting, and there's no simple method to take advantage of spreading an infection. Ransomware and information taking Trojans are considerably more typical, as are bots that let the bot-herder lease your PC for loathsome purposes. Current antivirus utilities handle Trojans, rootkits, spyware, adware, ransomware, and that's only the tip of the iceberg. PCMag has explored in excess of 40 distinctive business antivirus utilities, and that is not notwithstanding checking the many free antivirus devices. Out of that broad field we've named fourEditors' Choice items. mcafee activate product key antivirus utilities demonstrated powerful enough to procure an astounding four-star rating nearby their progressively conventional partners. VoodooSoft VoodooShield puts together its security with respect to stifling every obscure program while the PC is in a powerless state, for example, when it's associated with the web, and furthermore acts to identify known malware. The Kure resets the PC to a known safe state on each reboot, consequently wiping out any malware. On the off chance that you have malware, one of the ten items in the graph above should deal with the issue. You may see that one item in the outline earned simply 3.5 stars. The diagram had space for one more, and of the seven 3.5-star items, the labs just focus on F-Secure and G Data. F-Secure has the additional fillip of costing the equivalent for three licenses as most items charge for only one, so it advanced into the diagram. The blurbs at the base of this article incorporate each business antivirus that earned 3.5 stars or better. www.mcafee.com/activate offer insurance past the antivirus incorporated with Windows 10; the best free antivirus utilities additionally offer more. In any case, Microsoft Windows Defender Security Center is looking somewhat better recently, with some awesome scores from free testing labs. In our grasp on tests, it demonstrated a checked improvement since our past audit, enough to at long last bring it up to three stars. Tune in to the Labs We take the outcomes announced by free antivirus testing labs in all respects truly. The basic reality that a specific merchant's item appears in the outcomes is a demonstration of positive support, of sorts. It implies the lab considered the item huge, and the merchant felt the expense of testing was advantageous. Obviously, getting great scores in the tests is additionally significant. We pursue four labs that normally discharge nitty gritty reports: SE Labs, AV-Test Institute, MRG-Effitas, and AV-Comparatives. We likewise note whether sellers have contracted with ICSA Labs and West Coast labs for affirmation. We Test Malware, Spyware, and Adware Defenses We additionally subject each item to our very own hands-on trial of malware assurance, to a limited extent to get an inclination for how the item functions. Contingent upon how altogether the item averts malware establishment, it can acquire up to 10 for malware assurance. Our malware assurance test fundamentally utilizes a similar arrangement of tests for quite a long time. To check an item's treatment of fresh out of the box new malware, we test every item utilizing 100 amazingly new malware-facilitating URLs provided by MRG-Effitas, taking note of what level of them it blocked. Items get equivalent kudos for anticipating all entrance to the vindictive URL and for clearing out the malware during download. A few items win completely outstanding evaluations from the autonomous labs, yet don't toll too in our grasp on tests. In such cases, we concede to the labs, as they carry altogether more prominent assets to their testing. Need to know more? You can dive in for a point by point portrayal of how we test security programming. Multilayered Malware Protection Antivirus items separate themselves by going past the fundamentals of on-request examining and ongoing malware insurance. Some rate URLs that you visit or that appear in indexed lists, utilizing a red-yellow-green shading coding framework. Some effectively square procedures on your framework from associating with known malware-facilitating URLs or with false (phishing) pages. Programming has imperfections, and here and there those blemishes influence your mcafee security. Judicious clients keep Windows and all projects fixed, fixing those imperfections at the earliest opportunity. The defenselessness output offered by some antivirus items can check that every vital patches are available, and even apply any that are absent. Spyware comes in numerous structures, from concealed projects that log your each keystroke to Trojans that take on the appearance of legitimate projects while mining your own information. Any antivirus should deal with spyware, alongside every other sort of malware, yet some incorporate specific segments gave to spyware insurance. You expect an antivirus to recognize and dispose of terrible projects, and to disregard great projects. Shouldn't something be said about questions, programs it can't distinguish as positive or negative? Conduct based discovery can, in principle, secure you against malware that is so new scientists have never experienced it. In any case, this isn't generally an unmixed gift. It's normal for social discovery frameworks to hail numerous harmless practices performed by genuine projects. Whitelisting is another way to deal with the issue of obscure projects. A whitelist-based security framework just permits realized great projects to run. Questions are prohibited. This mode sometimes falls short for all circumstances, however it very well may be helpful. Sandboxing gives obscure projects a chance to run, however it segregates them from full access to your framework, so they can't do lasting damage. These different added layers serve to upgrade your assurance against malware. What's the Best Malware Protection? mcafee.com/activate antivirus would it be advisable for you to pick? You have an abundance of choices. Kaspersky Anti-Virus and Bitdefender Antivirus Plus routinely take impeccable or close ideal scores from the autonomous antivirus testing labs. A solitary membership for AntiVirus Plus gives you a chance to introduce security on the majority of your Windows, Android, Mac OS, and iOS gadgets. What's more, its unordinary conduct based recognition innovation implies Webroot SecureAnywhere Antivirus is the most diminutive antivirus around. We've named these four Editors' Choice for business antivirus, however they're by all account not the only items worth thought. Peruse the surveys of our top of the line items, and afterward settle on your own choice. Note that we have assessed a lot more antivirus utilities than we could incorporate into the diagram of top items. On the off chance that your preferred programming isn't recorded there, odds are we reviewed it. The blurbs beneath incorporate each item that oversaw 3.5 stars or better. Every one of the utilities recorded in this component are Windows antivirus applications. In case you're a macOS client, don't lose hope, be that as it may; PCMag has a different gathering devoted exclusively to the best Mac antivirus programming.
TheLittleEngineers / CoCoDragonFlexiMIDI V1R2CC-FlexiMIDI-V1R0-03.09.2009 and CC-FlexiMIDI-V1R1-03.09.2009 : Updated to CC-FlexiMIDI-V1R2-12.29.2019 on December 29, 2019 ================================ BACKGROUND: CC-FlexiMIDI-V1R0-03.09.2009 - A Hardware M.I.D.I. Interface Program Pak Cartridge for the Tandy Radio Shack TRS-80 Color Computer 1, 2 and 3, including clones and compatibles (Tano Dragon 64, Dragon Data D32, D64 and D200, Tandy Data Products TDP-100, etcetera) by "Little" John Eric Turner and his father "Big" John Robert (J.R.) Turner. Copyright 09 March 2009. Originally released as Open-Source Hardware on March 9, 2009. Subsequently released under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) License on 21 May 2019. ENJOY! Note that the original design is crap, however, a debugged version is forthcoming from "Uncle" Robert "The R.A.T." Allen Turner. CC-FlexiMIDI-V1R0-03.09.2009 has been updated to CC-FlexiMIDI-V1R1-03.09.2009 by R.A. Turner on May 21, 2019, just over ten years after the initial release of Version 1, Revision 0. Version 1, Revision 1 is Copyright (C) 2019 by the above mentioned parties and is released under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) License on 21 May 2019. =============================== DESCRIPTION: This project is an updated version of the "CC-FlexiMIDI-V1R0-03.09.2009", a hardware MIDI Interface Card for the Tandy Radio Shack TRS-80 Color Computer 1,2 and 3, Dragon Data Dragon D32, D64 and D200, Tandy Data Products TDP-100, Tano Dragon 64 and other clones and compatibles. The original "CC-FlexiMIDI-V1R0-03.09.2009" was designed by my nephew, "Little John", on March 8-9, 2009 as a learning excercise. He was teaching himself to use E.A.G.L.E. in order to design products for the TRS-80 Color Computer line of computers, with the help of his father, my brother, "Big John" or "J.R." as he is known to me. The "CC-FlexiMIDI-V1R0-03.09.2009" was among his very first (learning the art of circuit design) works. It is a terrible design only because he knew nothing about circuit design at the time and it does not appear that his father, "Big John" (J.R.) offered any input in regards to this particular design. I, "Uncle" Robert "The R.A.T." Allen Turner, have decided to polish up the design a bit and lay out a manufacturable Printed Circuit Board which I will release under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) License. As such, I will analyze "Little John's" original design and then provide my improved version. The original "CC-FlexiMIDI-V1R0-03.09.2009" design files, as provided by "Little John" and his father (J.R.) are contained in the "Original (Deprecated)" folder of this archive and should be referenced for this initial analysis of the design. ================================ ANALYSIS OF ORIGINAL DESIGN: Load up the "CC-FlexiMIDI-V1R0-03.09.2009.sch" schematic file and have it handy for this discussion. Starting with Page 1 of the schematic, we see the expected cartridge (program pak) plug followed by an oddly interesting series of "purported" interrupts, labeled IRQ0* and IRQ1* (the "*" indicates low-level triggering, or active low). These "Interrupts", IRQ0* and IRQ1* appear to go, through disable jumpers, to Pins 1 and 2 of the CoCo Cartridge (Program PAK) Connector. This is both ODD and INTERESTING because Pins 1 and 2 of that connector are -12V and +12V, respectively, on ALL CoCo 1's, TDP-100's and ALL Multi-Pak Interfaces. Both of these pins are +12V on the Dragon computers. Those self-same pins, however, are NOT connected to anything on ANY stock, unmodified, CoCo 2 or 3 computers. I am thus forced to draw the following conclusion: "Little John" apparently allowed for using Pins 1 and 2 of a CoCo 2 or 3 Cartridge Slot to connect to any desired interrupt within the CoCo 2 or 3. That is, a CoCo 2 or 3 might be modified to connect Pins 1 and/or 2 of the Cartridge Slot to any of the CPU Interrupts, the PIA Interrupt (CART*), G.I.M.E. (A.C.V.C.) Interrupts (CoCo 3 only), etcetera. This is an UNECCESSARY feature of the "FlexiMIDI" design and my initial inclination was to omit it from the design. However, since there are jumpers that allow these "hacked in" custom interrupts to be disabled (removed) via JP1 and/or JP2 or connected together (wire or'ed) via JP3, I have decided to leave them in the design should anyone be so inclined as to use this custom interrupt scheme for experimentation or otherwise. Also on Page 1 is a fairly standard RESET switch which I would imagine could prove to be quite convenient but potentially problematic if the device is plugged into a Multi-Pak Interface (RESET* is buffered in a single direction in the M.P.I. and should not be triggered from any cartridge plugged into the M.P.I.), Power ON L.E.D. (which I assume might be quite distracting) and some pull-up resistors for the interrupts, custom and legit. Lastly, there is a 220uF Electrolytic Capacitor for Vcc (+5V) filtering. Ideally, a low ESR Electrolytic should be used, however, paralleling a 220uF Electrolytic with a .1uF Ceramic Disc should provide approximately the same result as a single Low ESR type. Moving on to Page 2, we see a crystal oscillator comprised of three inverters, three resistors and a crystal rated at 1 to 2 MHz. The third inverter actually acts as a buffer and "shaper". Schmitt Trigger inverters are used, although this is not actually necessary it does provide a nice, sharp square wave. Without the hysteresis provided by the schmitt triggers the waveform would appear quasi-sinusoidal at the crystal frequency if viewed on an oscilloscope, but would still function just fine. The output of that third inverter, the buffer stage, is fed into a pair of toggling D type Flip-Flops which provide a divide by two output and a divide by four output, either of which may be selected by jumper JP4. Ideally, we want a solid 500KHz squarewave as the ACIA Clock (which "Little John" labeled "MIDICLOCK" or "MIDICLK"). If a 1MHz crystal is used we would place JP4 on Pins 1 and 2. With a 2MHz crystal we would connect JP4 Pins 2 and 3. This is flexible in that it allows the use of either a 1MHz or 2MHz crystal, whichever might be handy. In my case, and for the redesign, I have a large stock of 16MHz half-can oscillators and so this is what I will be using in the redesign. The 500KHz then, will be derived from the 16MHz oscillator by using the 16MHz to clock a binary counter. At the bottom left of Page 2, we also see three inverters used to invert A7, A4 and A3. This appears to be part of the "address decoding" scheme. Lastly, we see the decoupling capacitors for the inverters and "d-flops". This page (page 2) of the design is fairly solid and well designed. Moving on to page 3, we see the "heart" of the "CC-FlexiMIDI-V1R0-03.09.2009" MIDI Interface Pak. A 74LS133 13-Input NAND is used for address decoding. The 74LS133 in conjunction with the aforementioned inverters and the ACIA enable lines fully decode the ACIA into two consectutive memory addresses. With this, we can now decipher the addressing of the device. This will be done by writing A15 - A0 and filling in the "bit status" required to enable the ACIA, as follows: ========================================================================= | A15 A14 A13 A12 | A11 A10 A09 A08 | A07 A06 A05 A04 | A03 A02 A01 A00 | |=================|=================|=================|=================| | 1 1 1 1 | 1 1 1 1 | 0 1 1 0 | 0 1 1 x | |=================|=================|=================|================== | F | F | 6 | x | ========================================================================= Looking at the above table and noting that A0 selects one of the two internal ACIA registers, it is clear that "Little John" mapped the ACIA to 0xFF66 and 0xFF67. This seems ODD because the most popular MIDI Packs designed for use with the Tandy Radio Shack TRS-80 Color Computer decode the ACIA to 0xFF6E and 0xFF6F. A bit of research, however, led to the discovery that the original CoCo MIDI Pack, "The Colorchestra", mapped the ACIA at 0xFF66 and 0xFF67. The "Colorchestra" was released in 1985 by "Color Horizons" and I own two of them. The aforementioned "research" was simply me looking at the "Colorchestra" P.C.B. and deciphering the address decoding which turns out to be 0xFF66-67. I assume that "Little John" arrived at the 0xFF66-67 addressing in a similar manner as to that just mentioned. It would be relatively easy to redesign the "FlexiMIDI" to respond to both sets of addresses thus guaranteeing compatibility with everything. I have decided, however, that the redesign will feature a semi-programmable address decoder allowing the ACIA to be mapped to any two consecutive addresses within the 0xFF6n area. This will allow the "Flexi-MIDI" to be even more flexible. Setting the address decoder to respond to 0xFF66-67 will make the device "Colorchestra" compatible, whilst setting the decoder to respond to 0xFF6E-6F will make it compatible with the MIDI Interfaces produced by Speech Systems, MusicWare, Rulaford Research, Glenside CoCo Club and other CoCo MIDI Packs. As mentioned, it would be relatively easy to hardwire the decoder to respond to both the 0xFF66-67 and the 0xFF6E-6F address ranges, but I feel that this is unneccesary. Next, we see the 6850 ACIA. This is the "true heart" of the device - a hardware serial port. Looking at the 6850 section of this page of the schematic, we see yet another oddly interesting Interrupt Selection circuit. It is in the form of a 2x4 Jumper Block. This appears to allow selection of any 1 of 4 interrupts to be triggered by the ACIA. IRQ0* and IRQ1* are the previously mentioned "custom" interrupts. NMI* is the 6809 or G.I.M.E./A.C.V.C. Non-Maskable Interrupt Input. The last interrupt on the 2x4 block is the CART* interrupt. This is actually the 6809 or G.I.M.E. IRQ* line that is passed through a PIA inside the CoCo/Dragon. This, the CART* interrupt is the one that should be used for compatibility. The remaining circuitry on Page 3 are fairly standard circuits for MIDI IN, OUT and THROUGH. These go to 5-pin headers. It appears that "Little John" intended for MIDI Cable ends to be soldered to these headers. The redesign will feature 5-pin DIN MIDI connectors. I do see some potential problems with these MIDI IN, OUT and THRU connections on "Little John's" original design. The first problem that I notice is that the MIDI Ground Pins are connected to the same Ground (common or GND) as the computer and MIDI Pack circuitry. This is no good as it violates the MIDI specification and defeats the purpose of the opto-isolator. Thus, the redesign will sever the ground connection of the DIN connectors from the ground connection of the MIDI Interface Pak circuitry. Next, the 330 Ohm (330R) pull-up resistor connected to the output of the opto-isolator should probably be 270R, however, the device should work fine with the 330R resistor. The redesign will have this changed to 270R. The 10K resistor connected to the "BASE" of the opto-isolator darlington-transistor pair should not be needed. I will allow for it in the redesign for testing purposes. The output of the opto-isolator is sent through two schmitt trigger inverters before being applied to the "Receive Data" input of the ACIA. I am drawing the following conclusion in regards to those two inverters: It seems the design was originally intended for use with a Sharp PC-900 or PC-900V digital opto-isolator which has an internal schmitt trigger, the hysteresis of which provides nice, sharp waveform edges. It appears that "Little John" decided, instead, to use a 6N138 opto-isolator, which does not have hysteresis (schmitt triggering) and thus he must have included the two inverters to alleviate this perceived problem. I am relatively certain, however, that these two inverters are unneccessary and thus I will remove them in the redesign. Had I not used two of the inverters in the hex-inverter package for address decoding, I might have left these two inverters in the redesign, however, I decided the savings of one chip was worth eliminating these two inverters. Hopefully, results will be satisfactory. That is about it for the initial analysis of "Little John's" original design. I shall now proceed to design a slightly improved and, hopefully, manufacturable version of "Little John's CC-FlexiMIDI-V1R0-03.09.2009" Hardware M.I.D.I. Interface Pack. This redesign will be titled: "CC-FlexiMIDI-V1R1-03.09.2009". ================================ THE REDESIGN: Load up the NEW design from the CURRENT folder in the archive and use it to follow this discussion. Starting with Page 1 of the schematic, I will start the redesign with the Cartridge Program Pak Slot Plug (Edge-Card or Edge-Fingers). This is what will actually plug into the cartridge port on the computer or Multi-Pak Interface (M.P.I.). Next, I will add an edge card socket wired in parallel to the edge-fingers. This is based on "Little John's" Universal Footprint which means that you can fit either a 40-pin card socket or a 40-pin header. This will allow an additional cartridge or other hardware to be plugged directly into the MIDI Interface, thus eliminating the need for a "y-cable" or Multi-Pak Interface. The +5V is filtered with a 220uF Electrolytic Capacitor in parallel with a .1uF Ceramic Disc or Dacron/Polyester/Mylar capacitor. A Power ON L.E.D. indicator is included here, along with an enable/disable jumper. Removing the jumper disables the Power ON L.E.D. should it become a distraction. Next, I'll add in the "CUSTOM" Interrupts, including their jumpers. The jumpers should be REMOVED from all of these if the device is to be used with a CoCo 1 and/or M.P.I. (Multi-Pak Interface) or with ANY of the CoCo Clones and/or compatibles, including the Dragon. In actuality, these jumpers should never be needed and thus should never be installed - they are for experimental purposes only. Removing the jumpers prevents the accidental application of +/-12V to the IRQ* output pin of the ACIA which would fry the ACIA. I have included 680R "failsafe" resistors, but it is likely that they would not prevent a fried ACIA. Lastly, I have included the RESET Switch for convenience. The RESET switch should NEVER be pressed if the device is inserted in a Multi-Pak Interface as you may blow the 74LS367 in the M.P.I. That is about it for Page 1 of the redesign. Moving on to Page 2: This page is exclusively dedicated to the Baud Rate Generator for the ACIA. Starting at the left, we see the bypass capacitors for the 74LS590 counter. I have used both a 10uF Electrolytic and a .1uF (100nF) Ceramic Disc. This would be important for a ripple counter, however, the LS590 is a synchronous counter and so the Electrolytic could be omitted. I chose to leave it in. There is also a bypass capacitor for the 16MHz oscillator can. I created a dual-footprint for the oscillator can which allows the use of a full or half can oscillator. The 16MHz is fed into the LS590 counter which provides a choice of ten different clocks for the ACIA. For compatibility with existing standard MIDI packs for the CoCo, the 500KHz clock should be selected. The LS590 has an output register which is clocked by the same 16MHz that clocks the counter section. The enable pin of the oscillator is connected to system RESET* which prevents it from oscillating when the system is in a reset state. This pin could have been left floating causing the oscillator to always oscillate. It will work either way. Page 3 is the semi-programmable address decoder. The 74LS133 in conjunction with the two inverters decodes 0xFF6n - the output will go low on any access to the 0xFF6x range. Only 12 of the 13 inputs to the LS133 were needed. The unused input could be connected to Vcc, E or RESET*. It is important to gate the E Clock in at some point and it could have been done here. I chose to connect the input to RESET*. The ACIA actually has an E Clock input which gates it with the E-Clock so it probably does not need to be gated to the address decoder, though, as you'll see, I gated the E-Clock into the next stage. The 74LS138 decodes 1 of 8 sets of even/odd addresses in the 0xFF6n range (it is enabled by the output of the LS133 and the E-Clock).) So, when any address in the 0xFF6n range appears on the address buss during the high time of the E-clock, the LS138 is enabled and decodes A1-A3 into 1-of-8 chip selects. For maximum compatibility, the 0xFF6E-F output should be selected. Page 4: This is the 6850 ACIA. This should be either a 68B50 or a 63B50 or 63C50 for operation at up to 2MHz CPU Clocks. This should be pretty self-explanatory. The 6850 datasheet can fill in any necessary details. Page 5: This is a fairly standard MIDI IN circuit. There are two optocouplers here: a 6N138 and a PC-900 - You should use ONLY ONE, not both. R9 is only needed if you use the 6N138. The diode is a 1N4148 or 1N914A. Page 6: This is a fairly standard MIDI Out circuit. Page 7: This is the final page and is a fairly standard MIDI Thru circuit. It simply echoes the MIDI In. Well, that's about it for a redesign of "Little John's" original. I am ordering some prototype boards to see if this thing will work. Updated to CC-FlexiMIDI-V1R2-12.29.2019 on December 29, 2019 - This minor update: A Universal 5-Pin DIN component was created and the GND Connection was reconnected to MIDI OUT and MIDI THRU. NO GND connection was made to MIDI IN. This should now create a proper MIDI Interface.
kanchudeep / Geomagnetism JavaJava class to calculate magnetic declination, magnetic field strength, inclination etc. for any point on the earth
cs-eliseev / Helpers WordThe helpers allows you to modify string data. Inclination, transliterate, convert month date and convert number or amount to word - all this is available in this library.
NJNischal / End To End Learning For Self Driving CarsImplemented vision-based algorithm to learn and imitate human driving behavior using Convolutional Neural Networks. Trained model autonomously drives the car safely while maintaining lanes and adjusts for inclinations and sharp turns. Simulated and evaluated on Udacity’s Unity Autonomous Simulator.
sugwg / Gw170817 Inclination AngleMeasuring the viewing angle of GW170817 with electromagnetic and gravitational waves
Berg0162 / Simcline V2Arduino Library for Simulation of Changing Road Inclination for Indoor Cycling
mToscanoMoreno / DEM AIADEM-AIA: Asymmetric Inclination-Aware Trajectory Planner for Off-Road Vehicles with Digital Elevation Models