Oct 2011

home security comparison

home security systems wirelessmilitary forces in times of conflict is not a new concept. According to author Gordon Campbell, ashington has "always" used contractors in times of war. There are many contemporary issues and potential problems when the U. S. military signs deals with private contractors, as it did in Iraq and is currently doing in Afghanistan. The main issue revolves around the concept of hiring 180,000 private contractors to support and in some cases substitute for U.

Uncategorized | 3 Comments

Oct 2011

security alarms systems

burglar alarms companyWe started off by setting the first four ports of PORTB as the inputs and the latter four ports as the outputs. The first four ports are connected to the columns meanwhile the last four are connected to the rows. Moreover, as a justification for this reasoning is the fact that it is required to scan the columns for the pressed key and then scan the rows and the results will be decoded in a decoder telling us which button of the keypad was pressed. The main functionality of the keypad as mentioned earlier is to set the code. The alarm can be armed and disarmed with a standard four digit user code in our case. The master code is a step above a regular user code.

Uncategorized | 8 Comments