Basic Python example using Tkinter to form a GUI and prints out the inputs into the terminal.
Category: Software
Python: MatPlotLib Data Visualization Example
After collecting your data as part of a V&V effort, it helps to be able to visualize it to help determine a PASS or a FAIL. This post will walk you through a couple setups. The Data Files For the purposes of this example, you will find a couple of CSV files on my GitHub […]
Python: Working with CSV Files
One of the primary tasks I personally use Python for is data collection and manipulation. In this post I’ll walk you through some basic CSV file work. Reading from a CSV File Take the CSV file below, it’s a collection of collected ADC points with the acquisition number preceding it. We’re going to take this […]
Python: Setting Up an Environment
Python is a great tool to quickly and easily automate a task or crunch some data. Python XY is a distribution that provides an incredibly simple installer and pulls together an assortment of packages aimed at analysis for scientists and engineers. You can download the installer from the Python XY Website Here. The installer is […]
C# Example – Hash Checker
In part of an effort to push documentation, traceability, and verification to the production and engineering workflows I created a simple WPF calculator and comparator for MD5 and SHA1 cryptographic hashes. The program currently supports MD5 and SHA1 hashes. Running the software Download the repository from the GitHub link below. Run the EXE file located […]
Hashes in the Firmware Development Workflow
Hashes are like checksums in that it takes an individual binary file and uses an algorithm based on the original file to generate an individual number. This number can then be compared to a reference number to determine integrity and authenticity of the file. These hashes play an integral part in production releases of a […]
C# Example – CRC8 Implementation
In support of my previous post on the CRC8 checksum. I compiled this basic program to provide a real-world implementation. The example uses a potential serial communication protocol that consists of a START and END deliminter using GREATER-THAN and LESS-THAN symbols. The first two bytes L1 and L0 indicate the length of the payload (Command […]