How data logger works?
(1/1)
Samk80:
Hi,
I've seen this data logger that claims that it can generate 3D map of the scanned area when connected to the Pi metal detectors.
Here's a brief info:
You are not allowed to view links.
Please Register or Loginhttp://gdi-detectors.com/download/icon-data-3d/?wpdmdl=30157
Is this just a basic microphone that generates the logs based on the audio tone it receives from the receiver?
Cheers.
Sam
Linkback: You are not allowed to view links.
Please Register or Loginhttp://www.thunting.com/smf/index.php/topic,71006.msg330557.html#msg330557
Eugene52:
Quote:Posted by Samk80Hi,
I've seen this data logger that claims that it can generate 3D map of the scanned area when connected to the Pi metal detectors.
Here's a brief info:
You are not allowed to view links.
Please Register or Loginhttp://gdi-detectors.com/download/icon-data-3d/?wpdmdl=30157
Is this just a basic microphone that generates the logs based on the audio tone it receives from the receiver?
Cheers.
Sam
Hello Sam.
Thank-you for posting and I will check it out.
Regards................Eugene
Linkback: You are not allowed to view links.
Please Register or Loginhttp://www.thunting.com/smf/index.php/topic,71006.msg330562.html#msg330562
Melbeta:
Never used a data logger on a metal detector before. But I used one back in the early days of Cable TV equipment. You took the data stream, which was inside the Cable TV coax cable, containing everything. It stripped out the data stream, which then was analog stream, later on, they went to digital data stream, we used software and could switch back and forth. Each command, started with one first byte, which was the name of the command. After that, the rest of the bytes and bits were based on the software commands.The last byte, was the line checksum byte, which had to be right or the individual command was in error and the microprocessors would not execute it. Each entire stream commands, ended in a package which was called the file, and the last byte of the entire package, was the checksum byte for the ENTIRE file. It had to be right or the entire set om commands would not be executed.
That is how they are created, how they are sent out in the data stream, and how each individual command is checked by its own individual line command checksum byte. Then the entire package of commands, is checked by the final file checksum byte. Thus the microprocessor will then decide if the entire file is accurate, and not compromised by a hacker, and run the entire package of commands.
Now a data logger, is a piece of equipment, with electronic parts, and has an input and an output connector. Some are run by programmable chips, some are run by computer programs. The data stream enters the input, is processed and displayed on the computer screen, and everyone and anyone can see it on the screen. That is unless, it is protected by scrambling and a password. Thus if illegally intercepted by a hacker, the hacker first has to hack it for a useable password and user name. If the hacker does do that, then the big work begins, determing what each line of command is for, and what it does. Toward the end of each line of commands, a byte will contain bits of individual line parameters, thus it can and could change, and each individual bit of the parameter, would actually change the intent and process of each line of command. Thus an 8 byte word, could contain 64 bits of individual parameter bits of individual commands. And image an 512 byte word? Multiple the 512 times 512 and that is the number of individual bit parameter commands that one word of computer code can deliver to the processing unit...Mind boggling is it not??? That individual 512 byte word, could actually command and deliver 262,144 separate indiidual commands to do this or that. Now the byte words are larger today, like 1024, and 2048, and possible now even larger. Multiple each byte word of those numbers by itself number and wow would that confuse a hacker... Which is why a hacker would really need large computers with large byte speed and ability in order to do the hacking of today!!!!!!!! For example, just multiple 2048 by 2048 and see how many individual bit commands one word could do.........
Melbeta
Linkback: You are not allowed to view links.
Please Register or Loginhttp://www.thunting.com/smf/index.php/topic,71006.msg333236.html#msg333236
AK48:
hello , also have a look here : You are not allowed to view links.
Please Register or Loginhttp://www.lrlman.com/arc-geologger.htm
Linkback: You are not allowed to view links.
Please Register or Loginhttp://www.thunting.com/smf/index.php/topic,71006.msg333248.html#msg333248
Navigation
[0] Message Index