Kamis, 24 Juni 2010

power supply is completely self-contained, including a microphone pre-amp, audio processor, and bass and treble controls


The pulse width modulator shown above will supply approximately 320 watts (40 volts at 8 amperes) of modulated DC into a 5 ohm load. The output can be boosted to over 400 watts (45 volts at 9 amperes) by adding a 10v to 12v "boost" transformer in series with the main power transformer secondary.

Power Supply
Typically, a single voltage output power supply is all that is required for a pulse width modulator. The power supply voltage requirements will depend on the final RF amplifier carrier level voltage requirements. Generally, at least 2.5 times the carrier level DC voltage is required. Example: A transmitter operating at 45VDC, carrier level, using a pulse width modulator, will require a power supply voltage of at least 113 volts. 120V would be better, as there is usually some small voltage loss in wiring, modulator MOSFETs, etc.

The modulator/power supply is completely self-contained, including a microphone pre-amp, audio processor, and bass and treble controls. The microphone pre-amp, audio processor and tone controls are now implemented on a seperate, small PC board, and this PC board should be located within a minibox or other external or internal shielded enclosure.

The PWM generator board itself operates with line level audio. An adjustable negative peak limiter is included. The modulator can be configured (during construction) with up to 8 poles of audio filtering, and any cutoff frequency may be used.

This implementation includes an "Efficiency Meter", an invaluable tool for properly tuning class E transmitters without the need for an oscilloscope, along with sophisticated overload detection and shutdown circuitry. Note: an oscilloscope is needed for construction and initial testing.

The front panel is made with a plastic overlay. The overlay is comprised of 2 transparency (overhead projector) plastic sheets carefully taped together. An explanation of how to make the overlay is included in this document.

Circuit Overview
Audio is fed to the modulator at line level, directly to the input amplifier and phase select IC U200.
If microphone level audio is needed, a microphone preamp (available as a kit), is used. The line level output of the microphone preamp is then fed to the input of the PWM generator board.

A block diagram of the pulse width modulator showing most of the major components. The diagram and the modulator schematic use the same component identifiers (such as U300) to aid in understanding how the modulator works.

A second board (shown above) contains the Efficiency Meter and Overload Shutdown Circuitry. The board provides a variety of inputs and outputs, allowing the board to be used in many configurations and types of modulators.

The overload sensing circuitry monitors both the current flowing to the RF amplifier and the corresponding modulator output voltage. This enables the overload system to more accurately monitor the power used by the RF amplifier. If the current used by the RF amplifier increases significantly more than the voltage applied to the RF amplifier, the system will detect an overload, and will assert two TTL outputs (overload High and overload Low) as well as open a DPDT relay. The relay can be connected to other parts of the circuit, such as the high voltage power supply.

The TTL overload outputs are usually connected to the modulator low level circuitry, providing instant shutdown of the modulator output. This quick system shutdown is key to an effective overload protection system. The overload system also takes input from an optional external SWR bridge that provides around 1 or 2 volts DC from either the forward or reflected detectors. If the reflected voltage is more than about 1/2 of the forward voltage, the system will go into shutdown, and generate an overload shutdown event.

The Efficiency Meter (Patent Pending) (Non commercial, individual use of the circuit and method permitted) is an innovative circuit that provides an effective and accurate method of tuning a class E transmitter. The meter compares the power input of the RF amplifier to the RF output and displays the result on a panel meter. The RF output voltage is generated by rectifying and filtering a small portion of the RF output.

Tuning is simply a matter of obtaining the highest indication on the efficiency meter at the desired drain current. Since the RF output from the class E amplifier will change considerably as the optimum tuning point is reached, an RF level control is provided to keep the levels within the indication range of the meter. At optimum tuning, the meter will be sensitive to efficiency changes of under 1%.

The Efficiency Meter / Overload Shutdown PC Board has the following inputs and outputs:

*2 sets of relay contacts (DPDT relay) for control of external relays, 2 ea: N.C. and N.O.
*Plus - Minus 18V Unregulated DC input
*Overload High and Low outputs
*Reset High and Low inputs (used for reset and transmit / receive)
*+5 VDC for use with Reset inputs and Overload outputs
*SWR Forward and Reflected inputs (optional, ignored if no connection is made)
*Rectified RF sample for efficiency meter
*Modulated DC input, Modulated DC output
*Meter output, 0-1 MADC



From U200, the audio is fed to the negative peak limiter, and then into the anti-aliasing audio filter implemented around a TL074 IC (U300). The filter serves two purposes: 1) The filter prevents high audio frequencies, or audio harmonics from mixing with the pulse width modulator switching frequency (about 160kHz), and 2) The filter controls the audio bandwidth of the modulator.
After the anti aliasing filter, the audio is fed into the PWM controller IC, a Unitrode UCC25701N. This is an excellent voltage mode PWM controller, and exhibits extremely linear characteristics, resulting in a very clean pulse width modulated signal. The IC also implements Feed Forward, by which a small sample of the high voltage power supply's ripple is fed to the PWM controller, out of phase. The controller essentially modulates the pulse train with the power supply's ripple - out of phase with the actual ripple, and the result is a cancellation of the power supply ripple in the output. This is very effective at almost completely eliminating power supply ripple and hum.

From the PWM controller, the pulse width modulated signal is fed to a 74OL6010 opto isolator IC, U500. The isolation is necessary because the modulator is implemented as a source follower, and the driver IC along with other associated circuitry floats with the pulse width modulator output. IC U500 drives the IXDD414 (U502) driver IC. The driver IC drives the gates of the modulator MOSFETs

The modulator MOSFETs Q500 - Q504 amplify the 12V signal from driver U502 up to the full power supply voltage. When the gates of the Q500 bank are driven positively (PWM input signal goes high), the MOSFETs turn on hard, conducting power from the 115V high voltage power supply connected to the MOSFET drains, through the MOSFETs, to the MOSFET sources and ultimately to the output filter. When the PWM input signal goes low, the gates of Q500 are driven low, and the MOSFETs turn off. Energy stored in the input inductor of the filter is released, and the voltage at this point drops very rapidly. This is the "flyback" effect. The voltage would fall WELL below zero if the damper diodes (D507 - D511) did not clamp the voltage at 0V, and conduct the energy back to the (negative side of) the power supply.

The PWM output filter formed by, L FILT-1, L FILT-2, C FILT-1 and C FILT-2 integrates the pulse train (filters it out), and the filter output is modulated DC.

Most of the low level circuitry, along with the PWM output section is implemented on three printed circuit boards. The first board consists of the PWM generation circuitry, input filter, negative peak limiter. An optional microphone pre-amp, with compressor and tone controls is also available. The PWM board contains its own power supply (using an external power transformer) that also supplies power to the Efficiency Meter / Overload Shutdown board.

Note: these circuits can be implemented without the PC described boards. The boards make it somewhat easier to implement the low level circuitry, however dead bug or other breadboard construction can be used.

The pulse width modulator with the front panel open. The chassis including the front panel (without the meters) for this modulator was purchased at a local ham radio flea market for 50 cents, and was orginally used for another piece of equipment. Flea markets are a good source of parts for the home builder. Other sources are Ebay and various ham radio bulletin boards.

Closeup of the PWM generator board and Efficiency Meter / Overload Shutdown board as installed in the modulator chassis. Note that all on-board adjustments are accessible, and the modulator can be operated and adjusted with the front panel open.

Audio Inputs and Grounding

Care should be taken to avoid ground loops and other problems in your implementation. The ground point at the audio input is usually connected to ground. It may be necessary to also ground the the board at the PWM output. A balanced input is provided on the PWM generator board, if required. The board may be configured to be either balanced or unbalanced.

It is often desirable to provide an external audio level control. This is easily accomplished by simply connecting a potentiometer between the line level or microphone level input and the audio source. An audio phase select switch is provided on the PWM generator board. This switch is used to select the audio phase that results in the highest level of positive modulation.

The PWM Output should be carried on a shielded (preferable) or twisted pair cable and must be terminated at the far end. Very long cable runs can cause high frequency roll off in the PWM waveform, causing integration of the waveform and subsequent distortion at the extremes of modulation. Rev. D of the PWM output board requires the +12V output from the PWM generator.

PWM Output Section
The PWM output PC board can be configured with as few as one (1), to as many as five (5) power MOSFETs / Damper diodes. The number of devices installed depends on how much power the system is required to deliver. Each modulator MOSFET will handle about 250 watts of carrier power (DC input). So, if the modulator is to deliver 400 watts carrier, two MOSFETs and two damper diodes should be used.
Since the peak current output from the modulator is very high, a number of modulator outputs and ground connections are provided on the board. At least two of these should be used up to 500 watts of carrier, and all output and ground connectoins should be used if possible. A #14 wire should be connected to each output and ground connection. At the output, these wires are joined together and ultimately connected to the input of the PWM filter. The ground connections should be returned to the chassis or ground with short leads.

The board requires an 18VDC unregulated (and optionally unfiltered) DC input for the regulators supplying the optical isolator and for the charge pump that supplies a floating DC voltage for the the PWM driver IC (IXDD414). This 18VDC unregulated voltage should be supplied by its own power supply, and should not be taken from the PWM generator board or power supply. This is done to reduce coupling between the high power PWM output section and the highly sensitive low level circuitry on the PWM generator board. The high voltage DC input to the board should be switched on and off with transmit / receive. The capacitors on the modulator output board will normally remain charged between transmissions. A resistor should be placed across any relay that switches the DC from the power supply to the PWM output board to minimize relay arcing when going from receive to transmit. This is customarily part of the main power supply and transmit / receive circuitry (see transmit / receive circuit diagram).

The PWM Output Filter
The output filter is one of the most important components in any PWM system. While the design and construction of the filter is not particularly difficult, and improperly designed or implemented filter can be the cause of major problems. All of the filters shown here are Butterworth filters. This filter implementation gives a good cutoff characteristic, without too much ripple (bumps in the response) in the passband of the filter. Each reactive element (inductor or capacitor) results in one filter pole. A 4 pole filter is used here.
This particular pulse width modulator implementation is designed for a 5 ohm load. This means that the RF amplifier is adjusted such that it always represents a 5 ohm load to the modulator. As an example, if the modulator (at carrier) is delivering 40 volts DC, the RF amplifier current must be adjusted to be 8 amperes. This yields a load of 5 ohms - [40V / 8A = 5 Ohms]. If the modulator output were 45 Volts, the RF amplifier current would need to be 9 Amperes to maintain the 5 ohm load on the filter.

Inductor Construction

The input and output inductors of the PWM output filter are wound on CH777060 High Flux Cores (CWS/Bytemark). These cores are designed to be very stable over large variations in current, and are also very good when used with a high DC bias. The inductors are wound using #14 insulated, solid copper wire. The turns should be spaced evenly around the cores, so as to utilize as much of the core as possible.

In this implementation, the PWM filter inductors are held in place between 2 pieces of plexiglass. The filter inductors generate very little heat, so any convenient method of mounting may be used. The inductors should be sufficiently separated from each other to prevent coupling between the inductors.

These inductors are usable up to about 9 amperes of modulated DC. Above that, a larger core, or stacked cores should be used to prevent core saturation. An air core inductor may also be used.

Capacitors used in the Output Filter

The capacitors used in the output filter (C Filt-1 and C Filt-2) should be as close as practical to the values specified by the filter design. Use smaller capacitors in parallel to get the proper value if necessary. The leads from the capacitors in the filter and the ground plane should be as short as possible. Any stray inductance in the capacitor leads will reduce the effectiveness of the filter. The capacitor voltage rating should be at least equal to the high voltage power supply output voltage.

When figuring the capacitance of the last capacitor in the filter, be sure to include the capacitance of RF bypasses and any other capacitance that may exist between the filter and the load. The actual value of the output capacitor is the sum of all of the bypass and other capacitance in the circuit. This is often overlooked, and the result will be too much capacitance in the filter output capacitor.

Designing a Different Filter

If you are designing a modulator to work into other than 5 ohms, or if you want a different cutoff frequency, or if you want more poles (sharper cutoff slope), you will need to design your own filter. The process of designing the output filter is fairly straight-foward. Assuming you are using a Butterworth filter, there are plenty of Butterworth filter calculators available on the Internet to aid you in your design. You can also use the filter tables found in the ARRL handbook and other similar publications. Once you have the values for the inductors and capacitors needed for the filter, construction is simply a matter of winding the coils (whether toroidal or air wound) and connecting individual capacitors in parallel (if necessary) to get the needed circuit values.

Wire Size

The wire size used in the filter, and in the interconnecting wiring should be sufficiently large to carry the peak output from the modulator without introducing too much voltage drop. #12 or #14 wire works well up to about 9 amperes of unmodulated DC (carrier) current, #8 or #6 should be used with filters carrying up to about 15 amperes of unmodulated DC.




Using Air Wound Inductors
Air wound inductors work very well, and there are no core saturation issues with which to contend. Air inductors are also, in general, quite a bit less expensive to construct. The primary disadvantage of an air wound inductor is the size. More wire will be necessary to achieve the desired inductance than would be required in the same value inductor constructed on a toroidal core.
Since the amount of wire used in a typical air wound inductor can be significant, on the order of 10 to 20 feet, the inductor should be wound on some kind of form. PVC pipe works very well for the purpose, and it is easy to obtain, and is not at all expensive. It is also easy to drill. For large inductors, schedule 40 PVC should be used. It is usually easiest to lay the wire out on the floor, and carefully roll the PVC over the wire, keeping it tight while doing so. Some tape or glue can be used to hold the wire in place if there is a possibility of movement on the coil form.

To the right: PWM output filter implemented using air wound inductors. Note the capacitors built up by using multiple smaller capacitors in parallel to obtain the proper values. #6 wire is used in the filter inductors and in all interconnect wiring.

To the Right: Power Supply section of the pulse width modulator. The filter is made up of 5 2200uF 160V electrolytic capacitors. The high voltage transmit/receive relay can be seen at the bottom of the chassis. The internal power plug and outlet (visible to the far left) is provided to allow the connection of a Variac to the power supply, should it become necessary. It is a good idea to provide some facility for connecting a Variac to the high voltage power supply.

The current rating of the supply can be calculated by taking the carrier level DC input to the RF amplifier, and dividing this by the efficiency of the modulator (usually better than 90%) to get the total power input required. The power input is then divided by the total power supply voltage, to get the DC current requirement. As an example, an RF amplifier operating at 45 Volts, 11 Amperes is using 495 watts of power (input). Figuring a modulator efficiency of 90% (which is probably low), the total DC input required will be 550 watts.

The transmit/receive system for the transmitter should not allow the high voltage power supply T/R relay to be activated until all other relays or systems have been activated and had time to "settle". The power supply T/R relay should also be connected to the overload protection relay on the Overload Protection PC board, or some other overload shutdown system. When going to receive, the power supply T/R relay should be the FIRST relay to be deactivated. Ideally, the pulse train should be stopped slightly before or at the same time that the power supply T/R relay is deactivated. This will immediately stop the modulator output, and quickly remove power from the RF amplifier.

Filter Capacitor
The modulator uses a capacitor input filter consisting of 5 2200uF, 160V electrolytic capacitors in parallel giving a total capacitance of around 11000uF. This is not a huge amount of filter capacitance, and there will be a small amount of ripple on the output. This small ripple can be almost completely eliminated by using the Feed Forward feature of the PWM generator.

The power transformer used for this modulator delivers approximately 88VAC at 5.5 Amperes. This will yield a DC voltage of approximately 112 to 115 VDC, under load, depending on line voltage. The transformer secondary is center tapped, facilitating a "tune" position, facilitating transmitter tune up at low power.

In this modulator, a switchable 10VAC Boost transformer is included. The secondary of the Boost transformer is connected (when switched into the circuit) in series with the secondary of the main power transformer, boosting the total secondary AC voltage by 10 V. This will add appximately 12 to 13 VDC to the rectified and filtered output.
READ MORE - power supply is completely self-contained, including a microphone pre-amp, audio processor, and bass and treble controls
READ MORE - power supply is completely self-contained, including a microphone pre-amp, audio processor, and bass and treble controls

Rabu, 07 April 2010

Java History


Java History Beginning in 1991 formed a team called green The team is led by Patrick Naughton and James Gosling (A group of Sun engineers). At first they wanted to make a computer language that can be used by cable TV (Cable TV Box) which has a small memory and each company has different types. To apply this they use what ever attempted by Pascal.
Previous Niclaus Wirth has made a portable language that will be used in subsequent image machine is called a Virtual Machine, but it was not announced. Finally, use the green team is finally their ideas to create Java Virtual Machine. Vitual machine made this can be run in different java platforms. In 1992 the green team make products that are named * 7 (Star Seven)
However, these products fail in the market. After that created a new product. This java, programming language originally created it was given the name "oak" (This name probably derived from the name of an existing tree in front of the window James Gosling) But after a review found the name oak has been used. Thus was born the name "Java" In the year 1993 until the mid-1994 the green team has a new name First Person. Inc. spent only with respect to the sale of its products. Apparently none of those found. Finally, in 1994 First Person dissolved.
In that year the Web has changed rapidly when it is widely used browser is Mosaic a free browser.
In an interview in the mid-94 James Gosling says "We could build a real cool browser. It was one of the few things in the client / serve the mainstream that needed some of the weird things We'd done: architecture neutral, real-time, reliable, secure-weren't issues that terribly important in the workstation world. So we built a browser. " Finally a browser that was made by Patrick Naughton and Jonathan Payne. The browser was named Hot Java. This browser is made by using java language to show Traffic from java. Are no less great they also make the technology known as a browser applet that can run within the browser program code. This is proof of that technology is shown java on 25 May 1995 Since then the browser java browser gives license to others to be able to run the applet and in 1996 applied to Internet Explorer. Finally, in 1996 issued the first version of java with java issue 1:02 In the year 1998 issued java 1.2 and java started out slogan "Write once, Run anywhre"

Java Edition
Java is a language that can run anywhere and on any platform any, in various environmentInternet, Intranets, electronic consumer products, and computer applications.The java 2 platform is available in 3 editions for different purposes. For a variety of applications created with the Java language, java bundled in editions:
1. Java 2 Standard Edition (J2SE)
2. Java 2 Enterprise Edition (J2EE)
3. Java 2 Micro Edition (J2ME)
Each - each edition contains the Java 2 Software Development Kit (J2SDK) to develop applications and the Java 2 Runtime Environent (j2re) to run the application.
Excess Java compared to C + + Java makers have designed programs to eliminate the allocation of java and memory deallocation manually, because java has Garbage Collection Introduction of the actual array declaration and eliminate pointer arithmetic. This often causes a memory overwrite.
Removal of multiple inheritance, they replaced it with the interface.
JAVA is the language of object-oriented programming (OOP) and can run on different operating system platforms with characteristics used programs such as C + +, Open Platform, Wora (Write One Run Anywhere), portable, multiplatform, the program can run on the Windows operating system, Solaris, Macintosh, Linux / Unix, the architecture firm and secure programming is supported by the Open Source community.
Characteristics of Java Programming.
  1. Simple. Java programming language uses a syntax similar to C + + but the syntax of Java has improved a lot in eliminating the use of pointers especially complicated.
  2. Object oriented. Java using object-oriented programming so as to facilitate the program development process, improve quality, easier maintenance, enhance the ability to modify and improve software reuse.
  3. Distributed. Java was made to create distributed applications easily with of integrated networking libraries in Java.
  4. Interpreted. Run Java programs using the Java Virtual interpreters Machine (JVM). JVM is an imaginary machine (virtual) that working with applications like on a real machine. JVM hardware specifications and provide a platform where the compilation Java code occurs. This makes the specification-based applications Java to be free from any platform for the compilation completed by the JVM. Applications created with Java program files
    text using ". java". The program is compiled to produce a bytecode file using ". class". Bytecode is a set of instructions similar to machine code instructions. The difference is the machine code must run on the system computer JDBC (Java Database Connectivity) provides a way to access the database independently of the database vendors. This causes the Java source code that has been compiled into Java bytecodes can run on different platforms different.
  5. Robust. Java has a high reliability. Compiler in Java has the ability to detect errors more thoroughly compared to other programming languages. Java has a runtime - Exception handling to help overcome the error in programming.
  6. Secure. As a programming language for Internet and distributed applications, Java has several security mechanisms to keep the application not used to damage a computer system that runs application.
  7. Architecture firm. Architecture is robust and secure programming supported by the Open Source community (the third largest after the C and C + + and implementation of the Java language has become public property).
  8. Portable. Source code and Java programs can easily be taken to platform different without being recompiled.
  9. Multithreaded. Java has the ability to create a program that can do several jobs at once and simultaneously.
  10. Dynamic. Java is designed to be run in a dynamic environment. Changes in a class by adding properties or method carried out without interfering with programs that use the class.
JAVA Security techniques.
  • Language is designed to complicate the execution of malicious code. Negation pointer security is a major step. Java is not operation known pointer. The operation pointer is outside the used for optimization and the creation of efficient programs and awesome. Pointer is a great tool for Usage. With negation pointer operation, java can be language that JDBC provides one way to access the database independently of the database vendor. Through JDBC can be mySQL access with the same program to access the Oracle, and PostgreSQL UDB2. This supports the spirit of java write once, run anywhere.
  • The main key of the JDBC is a JDBC Driver is responsible be the bridge between java programs and databases. JDBC Driver for mySQL, for example, was responsible for bridge between programs written in java to mySQL RDBMS.
  • To access the database via JDBC, it is necessary to use objects Connection. There are objects Statement and PreparedStatement. Through the Statement and PreparedStatement, use the SQL command to databases such as INSERT, SELECT, UPDATE, and DELETE.
  • Java has some security to the applet. To prevent disturbing action program storage medium, then the applet not allowed to open, read or write to the file arbitrarily. Since java applet can open a window The new browser, the window has java logos and text identification of the open window. This prevents the window pop-up menu as a request username and password information.
READ MORE - Java History
READ MORE - Java History

Controls are objects that can be placed on a form Visual Basic

Visual Basic is basically a computer programming language high level (High Level Language) such as java program where the instructions are like human language, so much easier to understand.
Visual Basic is a development of the language BASIC (Beginner `s All-Purpose Symbolic Instruction Code). At first, BASIC was designed in order to be used by novice programmers. Visual Basic still retaining some of the syntax or format of writing a program in BASIC language.
Some of the capabilities or benefits of Visual Basic is :
  1. Can be used to create Windows-based applications easily and quickly, which produces a final extension programs. EXE executable in nature, or can be directly executed.
  2. Can be used to create objects such as a program assistant Active X control, Help files, Internet applications, and so on.
Menu Bar : Is a menu bar at the top of the display menus from Visual Basic, including:
File: Managing Files and Printing, as well as to create executable EXE file. For example, New, Save, Open, and so on.
  1. Edit: standard editing function, Undo and Searching. For example Cut, Paste.
  2. View: Show or hide the Form Window and the Toolbar.
  3. Project: Set the project properties, add or reduce the form and module, as well as to increase or decrease the control object is used.
  4. Debug: Start or stop debugging and stepping.
  5. Run: run the program, such as Run, Build.

Toolbox : a collection of symbols is the control / object that contain all the objects or controls needed to make an application program.
Form Designer : It is a appearance in the middle (largest) as a form of work design and the object or control is placed.
Code Window : It is a appearance in the middle (largest) that alternate with Form Designer, containing the codes of the program for each object or control. Source code is the control center of the application ordered anything done by the application program.
Project Explorer : It is a window on the right above that describes the hierarchy of project files / programs that are undertaken. Hierarchy / the contents of this project can be forms or modules.
Properties Window : It is the right of the window that displays the properties or the nature or characteristics of a form or control. List this property can be changed according to the form or control that was selected.
Toolbar : This is the icon row of buttons below the menu bar that represents a specific command from Visual Basic. Usefulness of each button from left to right can be seen as follows.
  1. Add Project: Adding the project into an existing project.
  2. Data View Window: Displays the data view window.
  3. Toolbox: Displays the window toolbox.
  4. Object Browser: Displays the Object Browser Window.
  5. Form layout window: Displays the Form Layout window which serves to show the position of form on the monitor screen.
  6. Properties window: Displays the Properties window.
  7. Project Explorer: Displays windows explorer project.
  8. Start / Break / End: Running / pause / stop the project made.
  9. Save Project Group: Saving the Visual Basic project.
  10. Open Project: Opens the Visual Basic project that already exists.
  11. Menu Editor: Displays menu that serves as editor menu maker.
  12. Add Item: Adding components or objects into the window.
Controls are objects that can be placed on a form. Form itself is a window in the application that created the standard form where the title and box with minimize button, restore and maximize. There are many controls that can be placed on the form in accordance with the needs of our program.

 (Pointer) To select the control in the form.


 (Picture box) container box drawing

(Paper label) that is static or can not be changed by the user


 (Text Box) box where users enter text / data input


 (Frame) Box for grouping several objects of control.


 (Command button) key / button to trigger a specific program of action

 (Check box) option box that nature is free to choose.


 (Vscroll bar ) Has the form of a scroll bar can be moved up and down the vertical shape.


 (Option box) its option box to select one.


 (Combo box) shaped box drop down options.


 (List box) Box-shaped selection list.


 (Hscroll bar) Has the form of a scroll bar can be shifted to left and right horizontal.

 (timer) timers.


 (Drive list box) Grid computer drive option .


 (Dir list box) Box list of directories / folders computer.


 (File list box) Grid list of files on your computer.


 (Shape) Built forms flat (square, rectangle, circle, ellipse).


 (Line) Line form to create.


 (Picture box) Container for a display of the image file.


 (Data) Container for a display of the image file.


 (OLE) Controls to include other objects.


Programming Visual Basic programming techniques using an OOP (Object Oriented Programming) is a programming technique that models the program as a collection of objects that have relationships to each other or intertwined with each other wistful.

Each control (object) has properties, methods and events different.
Properties are attributes attached to a control (object) which is usually the appearance characteristics such as color, typeface, size and so on. Property of a control (object) can be changed at the time of programming (using the property window) or at the time the program starts (using the program codes in the code window).
Method is the action that is owned by the controls (objects) so that the user (programmer) can use it to manipulate things. Method depends on the instructions given by the programmer through the writing of code. Example: Command1.Click
Event is an event or anything that can be experienced by an object. A control (object) can have a lot of events. Example: Command1_Click (). Example: Command1.Caption = "OK"
READ MORE - Controls are objects that can be placed on a form Visual Basic
READ MORE - Controls are objects that can be placed on a form Visual Basic

Object-oriented programming (OOP)

Object-oriented programming is a programming paradigm to the object-oriented object orsomething. All data and functions in the place or classroom-object-oriented classes. Compare with structured programming logic. Each object can receive messages, process data, and send messages to other objects. Using OOP do so in solving a problem we do not see how to solve a problem (structured) objects but what can be done solving the problem. For example, assume we have a department that has a manager, secretary, clerk and other data. Suppose the manager wants to obtain data from the administration bag is not the manager have to take it directly but can be ordered administration officials to retrieve bags. In the case of a manager does not have to know how to retrieve the data but the manager can get the data via object administration officer. So to solve a problem with collaboration among the objects that exist because every object has his own job description.
Object-oriented programming consists of several classes :
  1. Class is a collection of definitions of data and functions in a unit for a particular purpose.
  2. Object to wrap the data and functions together as a unit in a computer program; object is the basis of modularity and structure in an object-oriented computer program.
  3. Abstraction is the ability of a program to pass information processing aspects of it, namely the ability to focus on the core. Every object in the system serve as a model of the "actors" who can do abstract work, reports and changes in circumstances, and communicate with other objects in the system, without disclosing how the excess is applied. Processes, functions or methods can also be made abstract.
  4. Ensuring users encapsulation for an object can not change the state of an object in a way that is not feasible; only method in which the object is given permission to access the situation. Each object access interface that mentions how other objects can interact with it. Other objects will not know and depend on the representation of the object.
  5. Inheritas to Organize polymorphism and encapsulation by allowing objects to be defined and created a special type of object already exists - these objects can share (and expand) their behavior without re-touching to implement such behavior (object-based languages do not always have inheritas).
The main focus on the functions and procedures that operate on the data, Fokus functions and procedures that operate on the data Big, Program program is divided into small units called functions, Data and functions are treated as separate entities, Data freely move around the system from one other function. The following design, Program "Top Down Approach". fokus the data being operated and do not function or procedure, Programs divided into what are called objects, Data and joint function are treated as separate entities, Data hidden and can not be accessed by external functions, The following design, Program "Bottom Up Approach".
READ MORE - Object-oriented programming (OOP)
READ MORE - Object-oriented programming (OOP)

Senin, 05 April 2010

program prime numbers are real numbers greater of Language C


prime numbers are real numbers greater than 1, the divider factor is the number 1 and it self. 2 and 3 are prime numbers. 4 is not prime because 4 can be divided by 2. Ten of the first prime numbers are 2, 3, 5, 7, 11, 13, 17, 19, 23 and 29. If a number greater than one are not prime numbers, the numbers are called composite numbers.

Language C strongly supports modular programming Since the initial C language program is divided into modules (some) Modules in C language functions known as (function)
Language C consists of functions, either directly declared in the program or are separated in the header file. Functions that are always there in the C program is main function.
Function / function is a collection of instructions / orders / programs grouped into one, located
separate from the program using these functions, have given a unique name, and used to do an objective certain. Functions - functions make the program has a clear structure. By separating step - step detail to one or more functions - functions, the main function (main) will be shorter, clear and easily understood. The functions are used to avoid writing The same program written repeatedly - again. Step - the step can be written only once separately in the form of the function. Next section programs that require step - this step is not should always write it down, not enough to call the function it. The argument can be there or not (optional) which used to accept arguments / parameters. Between the arguments are separated by use a comma.
function prototype is accompanied by a code implementation of the function, which contains statements / instructions that will perform duties in accordance with the objectives made functions.
READ MORE - program prime numbers are real numbers greater of Language C
READ MORE - program prime numbers are real numbers greater of Language C

programming C example triangles result elbow

programming C

  1. # include : line is a line iostream.h header declaration that serves to use the function input and output streams of printf and scanf
  2. # include : serves to show the function getch ().
  3. # include : This program lines to use manipulation functions of input and output "next tutorial".
  4. # define maxs 7: This line is declaring a constant maxs = 7.
  5. int column, row;: This line is a declaration of the row and column variables that will be used to control the iteration.
  6. clrscr ();: This program lines is a function of conio.h header file that serves to clean the screen "clearscreen".
triangles result elbow
READ MORE - programming C example triangles result elbow
READ MORE - programming C example triangles result elbow

C + + programs have a main function

# include
The sentence that begins with the sign (#) is a directive to preprosesor. Not a line of code is executed, but the indications for the compiler. In this case the phrase # include notify preprosesor header compiler to include the iostream standard file. This specific file also includes declarations standard library I / O in pemrograman C + + and this file is included because its functions will be used later in the program. The function used is the court stands for the console out or display data to the console or screen.
# include
Because using getch, it is necessary declaration header file that stores declaration conio getch function.
int main ()
This line matches at the beginning of the declaration of main functions. main function is the starting point where all the C + + program will begin execution. Placed at the beginning, middle or end of the program, the contents of the main functions will always be executed first. Basically, the entire C + + programs have a main function. play followed by a pair of parentheses () as a function. in C + +, all functions followed by a pair of parentheses () where, can contain arguments therein. The contents of the main function will then be followed, a formal and written declaration of ({}), brace as in the example.
getch ();
The function getch () function is to receive from the user entered via the keyboard, but in this program, getch only serves to stop the process before the results window disappears. If the getch command does not exist, then the results window will appear briefly and then quickly disappeared, so the last command executed.
results

differences in use "... \ n"
READ MORE - C + + programs have a main function
READ MORE - C + + programs have a main function

KNOWN PROGRAMMING LANGUAGE C and ELEMENTS BASIC PROGRAMMING, Character, Operator, Identifier, Constant

KNOWN PROGRAMMING LANGUAGE C

A. SEVEN ELEMENTS BASIC PROGRAMMING
Borland talk about there are seven basic elements of programming that must be understood by the programmer, namely:

  1. Get information and give to the program.
  2. Have a place to store information on.
  3. Give the correct instructions to manipulate the data.
  4. Take back the data, either raw data or processed results, to inform the user. For these needs, you can organize instruction so that:
  5. Some instructions executed only if some conditions are met.
  6. Some instructions can be executed repeatedly.
  7. Some instructions can be grouped into sections that can be executed from various locations of the program.

The seven basic elements of programming are respectively called the input, data, operations, output, conditional-execution, loops, and subprograms.

B. LANGUAGE ELEMENTS
1. Character
Letters, Numbers, and Line-bottom
The meaning of the letter is A s / d Z, and as / dz, the number is 0 to 9, and bottom-line is _.

White-space
The characters space, tab, line-feeds, carriage-return, form-feed, vertical-tab, and new-line is called white-space character because they have a function as a space between words or lines. Each identifier constant and always separated by these characters.

Signs reading and special character
Signs reading and special character in C has varied uses, from organizing the text until pendeinisian Vocational tasks that will be performed by the compiler. Characters who fall into this group are:

,. ;:? ! | / \ ~ + # % & ^ * - =" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">' "() [] () <>! | / \ ~ + #% & ^ * - =

Escape Sequence
Characters escape-sequence is a sequence of characters used to represent the expression of a different character. Collection of this character always begins by backslash character (\) and followed by a letter or a combination of numbers.
List of characters escape-sequence is as follows.

\ n new-line
\ t horizontal tab
\ v vertical-tab
\ b backspace
\ r carriage-reurn
\ f form-feed
\ a bell
\ 'Sign-quotes
\ "-Quotation mark
\ \ Backslash
\ ddd ASCII character in octal notation
\ XDDD ASCII characters in hexadecimal notation

2. Operator
Operator (symbol-operation) are the symbols, whether in the form of one or several characters, which specify how a value being manipulated. They are:

! = | ^ ' ++ -- -= += /= %= << >> ==" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">~ - + * /% <> = | ^ '+ + - -= + = / =% = <<>> ==
= |= && || ?: &= ^= <<= >>=" onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">! = <=> = | = & & | |?: & = ^ = <<=>> =

3. Constant
Integer Constant
An integer-constant is a decimal number, octal, or hexadecimal that represents an integer value.
A constant-decimal (based-ten) was formed by a set of numbers 0 to 9, with the stipulation does not begin by the number 0. A constant-octal (based-eight) is formed by a set of numbers 0 to 7, with the provisions initiated by the number 0. A constant-hexadecimal (sixteen-based) is formed by a set of numbers 0 to 9 and / or letters A s / d F or as / df, with provisions initiated by a number-letter 0x or 0x. Example:

Decimal Octal Hexadecimal
10 012 0xA
132 0204 0x84
32179 076663 0x7DB3

Floating-point Constant
A floating-point constant is a decimal number that represents a real number value. The value of this constant portions include integers, fractions, and exponents. This constant writing rules are like in the following format.

[digits] [. digits] [E | e [+|-] digits]

Where digits is a set of numbers from 0 s / d and E or e as an exponent symbol. Example:

12E-3 is 12 times 10 power -3
6.25E +4 means 6:25 times 10 power of 4

Character Constant
A character-constant formed by placing a character in the two-quotation marks ( ''). An escape-character is seen as a character, and therefore can be used as a constant character. Example:

'A'
'\ n'
'\ 0x41'

String-Literal
A string literal is formed by one or set of characters placed between the two-quotation marks. Example:

"BANDUNG"
"Today Fri \ 'at"
"Tit \ a \ a"
"Line-1 \ nBaris-2"

4. Identifier
Identifier is the name given to the constant-name, variable, type-data, function, and the label in the program. Each identifier to be used must be defined before.
An identifier is formed by one or several characters, as many as 31 characters, which starts by a letter or a line-down and can be followed by letters, numbers, or line-down. Take note, the language C distinguishes large-capitalization and small letters in an identifier. Example:

Clrscr
H2O
TempatTinggal
Nama_Siswa
City
Options

5. Keyword
To kegunan in programming, C language stoke some defined identifier, called keywords, for programmers. These words are instructions to C to do / express a certain thing. Therefore, all keywords can not be re-defined and used only as intended. Here is a list of keywords in the language C.

auto break case char const continue default do double else
enum extern float for goto if int long register return short
signed sizeof static struct switch typedef union unsigned void
volatile while

In addition to keywords above, the language C provides several other keyword that can be used in some particular implementations. That is:

near huge cdecl far pascal
READ MORE - KNOWN PROGRAMMING LANGUAGE C and ELEMENTS BASIC PROGRAMMING, Character, Operator, Identifier, Constant
READ MORE - KNOWN PROGRAMMING LANGUAGE C and ELEMENTS BASIC PROGRAMMING, Character, Operator, Identifier, Constant

Keys First and key code, Linux is Multi Users

Key code Linux Quick Study Every thing there was secret, there's how it works, there are systems and formulas. Linux, too. As the operating system, linux originally designed by ancestral example UNIX. But on the way, Linux has a remarkable evolution. lock code (which I define, of course) to understand Linux. What are the quick keys that advanced learning linux, please refer to the following notes.

Keys First, Linux is Multi Users

Linux supports multiple users in a system, the system here can include a network, LAN (Local Area Network), or just personal computers.

With the understanding that it multiusers linux, we can draw assumptions:

  • Default configuration for all users MUST exist and are stored in one place and at Copy SURE when you first create a user account on.

With this understanding, the administrator can perform a standard configuration as you wish without having to touch each user account.

  • With this understanding, users can install their own applications, have their own configuration, can run their own website, ftp themselves and others.
Key Second, Linux is multitasking Processes and tasks of each user is different DEFINITE. And will not interfere with other users. This means, you can run your own program without the worry over quota. This means, you can have a special directory that acts like a linux system. You can have a tmp directory, bin and lib your own. Key Third, the Linux Kernel Do not be confused with the many outstanding distribution and will continue to appear later. Every Linux distribution should follow the standard. These standards have the most basic foundation, the kernel. The kernel is responsible to recognize the file system, the kernel is responsible for how the applications interact with the hardware, the kernel also determines whether a feature / protocol supported or not. Try to notice, from the hundreds of distros that circulate nowadays, is not a system file structure and hierarchy equal or at least have similar arrangements? Is not, distributions that use the shell? And the internal order of each shell there are similarities? Is not the distros that use the desktop? And desktop environments that have similarities? Click on the left, right-click, scroll, ikonisasi, window, image format and so on. From this understanding, we can learn any distributions in minutes, if not within hours. Key Fourth, Linux's English-Language Kok, is entered into the category too? Clearly, our ability to understand the English language will be very helpful in understanding Linux. I do not mean to underestimate the distros based on regional languages. However, the cost and the energy expended to pursue progress and development of the emergence of new applications in the open source world are not comparable with the results achieved. It's easier for you, English language courses than 3 months to translate the documentation, message, and source code. Is not understanding English, you will be accepted everywhere? So, take time to learn English and enrich your vocabulary. Insha Allah, you will more quickly learn and adapt. Key Fifth, Linux's Shell Linux initially shell. Although it seems, "power" GUI start looking, in some degree, able to replace the GUI shell and able to work more efficiently than the GUI. Just bring your GUI system to a computer with minimum specifications, guaranteed not to work a maximum (or not work at all?). Compare this with the system shell that was taken to a dedicated environment for GUI systems. Wuzzzzz! Your system will work ten times as much. So, understand the shell, the shell study, is familiar with the shell, the shell is loved, surely you're in luck! :-) Key Sixth, Linux is Free and Open Source Why is this important? Because of the nature of Linux is free (in the sense-FREE), Linux has a mass of extraordinary support. Many communities are formed in each country, divided into projects, the distros and certain applications. In Indonesia itself, the masses that Linux is collected into a political party, might be able to vote later in 2009. By understanding Linux is Free (free) we are not afraid to use it in every aspect of computerized personal and societal. We can share it with sincerity or with minimal costs. With an understanding of Linux supported by a community, we can learn with others, we can share knowledge without fear of our names will be forgotten. Key Seventh, it also Linux Operating System This phrase is similar to the popular phrase from the band rockers seriuss, "rocker was also human". Linux is not much different from other operating systems like windows, mac os, bsd, solaris, dos, and more. The problems faced are also facing another OS Linux. Solutions for other operating systems can be applied in Linux. With this understanding, we do not have to wonder, "why on Linux, this driver does not work like in the OS-so". We do not need to stare, "my Ubuntu an earlier release, can be similar to the new OS looks like this". Do not too confident, too, a time, the virus will appear also in the world of Linux. Well, this summary can I write and I was forced, so matched my everyday. WARNING: 7 Keys to Advanced Linux is not a formula that was formulated by a like Linus or RMS or caliber Om or Om Onno Rusmanto. And certainly, not be able to get out of this caliber brain "you know who". So, bear the risk if you use them in an institution that "scientific".
READ MORE - Keys First and key code, Linux is Multi Users
READ MORE - Keys First and key code, Linux is Multi Users

Predecessor of the development of the programming language BASIC in Visual Basic


A programming language is the language that humans use to communicate with the computer. Computers require certainty and logic / algorithm is good and right to perform a specific instruction. Because the human mind is not structured so should be structured with these programming languages. Visual Basic is one of the high-level programming language (High Level Language) where the language more closely and easily understood by humans. Visual Basic developed by Microsoft since 1991, is the predecessor of the development of the programming language BASIC (Beginner's All-purpose Symbolic Instruction Code) which was developed in the era of the 1950s. Visual Basic is one of the computer programming language that supports object (Object Oriented Programming = OOP). Types of programming languages in general are divided into three namely:

  1. Language machine is a language that contains the machine code that can only be interpreted directly by the machine (computer). Often also called native code (the language that is highly dependent on a particular machine type). This language is a language of the lowest level (Low Level Language) and the form of binary code: 0 and 1. Execution of this language is very fast but also very difficult for humans to learn. Examples: for IBM/370 machine. For example; 0001100000110101 = 1835 which means the contents of the register duplicate register 5 to 3.
  2. Assembly language is a language of symbols of the machine language. Each machine language code symbols themselves in Assembly language. For example ADD for addition, for multiplication, SUB for subtraction, and others. A set of language codes can be formed program Assembly. Assembly language also has a population program debug it, unlike machine language. For example: Turbo Assembler and debug in DOS. Assembler will match the token symbol of the early s / d end, and then encoded into machine language. Rapid execution, were more easily learned than machine language, the file size is very small. But it remains less friendly to learn (not resembles human language) and very long program.
  3. High Level Language (High Level Language) which is closer to human language. This language also provides a lot of programming convenience facilities, such as: variables, data types, constants, control structures, loops, functions, procedures and others. Examples of these languages: Pascal, Basic, C + +, and Java. This language supports information hiding, encapsulation, and abstract data types. High-level language consisting of several generations, such as 3rd generation (Pascal, C / C + +) and generation-4 (Delphi, VB, VB.NET, Visual Foxpro). Compared to machine language and Assembly, High Level Language is easier to learn and linguistically close to the problems will be solved, but the short program code execution is slower. Visual programming languages other than Visual Basic include Visual C + +, Visual Java and Visual Foxpro. Conclusion: Visual Basic Development is one tool that is a tool for making a variety of computer programs, especially those using the Windows operating system. Visual Basic also provides a lot of programming convenience facilities, such as: variables, data types, constants, control structures, loops, functions, procedures and others. In accordance with technological developments and the needs of current language continues to be developed ability.
READ MORE - Predecessor of the development of the programming language BASIC in Visual Basic
READ MORE - Predecessor of the development of the programming language BASIC in Visual Basic

Client-server computing or networking


Client-server computing or networking is a distributed application architecture that partitions tasks or work loads between service providers (servers) and service requesters, called clients.

Often clients and servers operate over a computer network on separate hardware. A server machine is a high-performance host that is running one or more server programs which share its resources with clients. A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers which await (listen to) incoming requests.

The client-server characteristic describes the relationship of cooperating programs in an application. The server component provides a function or service to one or many clients, which initiate requests for such services.

Functions such as email exchange, web access and database access, are built on the client-server model. For example, a web browser is a client program running on a user's computer that may access information stored on a web server on the Internet. Users accessing banking services from their computer use a web browser client to send a request to a web server at a bank. That program may in turn forward the request to its own database client program that sends a request to a database server at another bank computer to retrieve the account information. The balance is returned to the bank database client, which in turn serves it back to the web browser client displaying the results to the user.

The client-server model has become one of the central ideas of network computing. Many business applications being written today use the client-server model. So do the Internet's main application protocols, such as HTTP, SMTP, Telnet, DNS. In marketing, the term has been used to distinguish distributed computing by smaller dispersed computers from the "monolithic" centralized computing of mainframe computers. But this distinction has largely disappeared as mainframes and their applications have also turned to the client-server model and become part of network computing.

Each instance of the client software can send data requests to one or more connected servers. In turn, the servers can accept these requests, process them, and return the requested information to the client. Although this concept can be applied for a variety of reasons to many different kinds of applications, the architecture remains fundamentally the same.

The most basic type of client-server architecture employs only two types of hosts: clients and servers. This type of architecture is sometimes referred to as two-tier. It allows devices to share files and resources. The two tier architecture means that the client acts as one tier and application in combination with server acts as another tier.

The interaction between client and server is often described using sequence diagrams. Sequence diagrams are standardized in the Unified Modeling Language.

Specific types of clients include web browsers, email clients, and online chat clients.

Specific types of servers include web servers, ftp servers, application servers, database servers, name servers, mail servers, file servers, print servers, and terminal servers. Most web services are also types of servers.

File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents, or electronic books. It may be implemented in a variety of storage, transmission, and distribution models. Common methods are manual sharing using removable media, centralized computer file server installations on computer networks, World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer (P2P) networking.

File sharing is not of itself illegal. However, the increasing popularity of the mp3 music format in the late 1990s led to the release and growth of Napster and other software that aided the sharing of electronic files. This in practice led to a huge growth in illegal file sharing: the sharing of copyright protected files without permission.

Although the original Napster service was shut down by court order, it paved the way for decentralized peer-to-peer file sharing networks such as Gnutella, Gnutella2, eDonkey2000, the now-defunct Kazaa network, and BitTorrent.

Many file sharing networks and services, accused of facilitating illegal file sharing, have been shut down[citation needed] due to litigation by groups such as the RIAA and MPAA. During the early 2000s, the fight against copyright infringement expanded into lawsuits against individual users of file sharing software.

The economic impact of illegal file sharing on media industries is disputed. Some studies conclude that unauthorized downloading of movies, music and software is unequivocally damaging the economy, while other studies suggest file sharing is not the primary cause of declines in sales. Illegal file sharing remains widespread, with mixed public opinion about the morality of the practice.

A peer-to-peer, commonly abbreviated to P2P, is any distributed network architecture composed of participants that make a portion of their resources (such as processing power, disk storage or network bandwidth) directly available to other network participants, without the need for central coordination instances (such as servers or stable hosts).

Peers are both suppliers and consumers of resources, in contrast to the traditional client-server model where only servers supply, and clients consume.

Peer-to-peer was popularized by file sharing systems like Napster. Peer-to-peer file sharing networks have inspired new structures and philosophies in other areas of human interaction. In such social contexts, peer-to-peer as a meme refers to the egalitarian social networking that is currently emerging throughout society, enabled by Internet technologies in general.

Peer-to-peer (P2P) is a term that originated from the popular concept of peer-to-peer computer application design, popularized by the large distributed file sharing systems, such as Napster, the first of its kind in the late 1990s. The concept has inspired new structures and philosophies in other areas of human interaction. In this context it refers to the meme of egalitarian social networking that is currently emerging throughout society, enabled by Internet technologies. This affords a critical look at current authoritarian and centralized social structures.

The peer-to-peer paradigm has been elucidated by Michel Bauwens in his thesis Peer to Peer and Human Evolution.

Peer-to-peer networks are typically formed dynamically by ad-hoc additions of nodes. In an 'ad-hoc' network, the removal of nodes has no significant impact on the network. The distributed architecture of an application in a peer-to-peer system provides enhanced scalability and service robustness.

Peer-to-peer systems often implement an Application Layer overlay network on top of the native or physical network topology. Such overlays are used for indexing and peer discovery. Content is typically exchanged directly over the underlying Internet Protocol (IP) network. Anonymous peer-to-peer systems are an exception, and implement extra routing layers to obscure the identity of the source or destination of queries.

In structured peer-to-peer networks, connections in the overlay are fixed. They typically use distributed hash table-based (DHT) indexing, such as in the Chord system (MIT)
READ MORE - Client-server computing or networking
READ MORE - Client-server computing or networking
.::BY JUMBHO-MY AT HOME IN THE JEPARA CITY OF BEAUTIFUL::.