SUPPLIES AND PARTS Arduino Nano R3module for weak signal amplification with LM358IRF730 mosfet transistorRotary Potentiometer, 10 kohmBuzzerLED (generic)Rechargeable Battery, Lithium IonGeneral Purpose Transistor NPN (2nd...
Category - Youth
Youth related posts will be share here.
SUPPLIES AND PARTS Arduino UNOHC-05 Bluetooth ModuleSparkFun Dual H-Bridge motor drivers L298Pimoroni Maker Essentials – Micro-motors & Grippy WheelsJumper wires (generic)Li-Ion Battery 1000mAhLED...
SUPPLIES AND PARTS Ultrasonic Sensor – HC-SR04 (Generic)Arduino UNOQunqi L298N Motor Drive Controller Board Module Dual H Bridge DC Stepper For9V battery (generic)9V Battery ClipMale/Female Jumper WiresJumper wires...
Ridge RFID Wallet (Carbon Fiber 3K) Although The Ridge is renowned for producing minimalist wallets, this one stands out because it inhibits radio frequency identification signals (RFID), making it difficult for thieves to...
A gearbox is a mechanical device that is used to provide speed and torque conversions from a rotating power source to output shaft. It is works on principle of meshing of teeth which result in the transmission of motion and...
Tools Blues Wireless Notecard (Cellular)Blues Wireless Notecarrier-AArduino Nano 33 BLE SenseSeeed Studio Grove – Light SensorSeeed Studio Grove – Air quality sensor v1.3DHT11 Temperature & Humidity Sensor (3...
Need of alignment test for a machine tool In plan and elevation, the tool must move in a straight line parallel to the workpiece’s axis of rotation.The axis connecting the centers of the headstock and tail stock must be...
The attachment is essentially made up of right-angle gear mechanisms that transfer power from the milling machine’s spindle to a vertical spindle with no change in speed. To temporarily convert a horizontal spindle, a...
Following are the factors affecting tool life. Cutting speedFeed and Depth of cutTool materialTool geometryWork materialNature of cutThe rigidity of the machine tool work systemCutting fluids Cutting Speed The most...
Cybersecurity Enabled by AI Cybersecurity companies are compelled to look for technological solutions to address the vulnerabilities due to the sharp rise in cyberattacks, email phishing scams, and ransomware. Millions of...