Am Dienstag 10 März 2009 20:41:44 schrieb emeliot: > On 10 Mar, 17:19, GWater <[email protected]> wrote: > > Am Dienstag 10 März 2009 14:19:10 schrieb emeliot: > > > Hi and thanks for yours answers :) > > > > > > I find that the sensor is : > > > > > > ;VGA Sensor > > > %USBPCamDesc% = SN.USBPCam,USB\VID_0c45&PID_6270 ; > > > SN9C201 + MI0360\MT9V111 > > > > > > so the same like Stefan tell. What's the problem what you think ?? > > > > > > Mateusz > > > > Could you please provide us with a log? > > > > Here is a guide (if too complicated simplify - we just need records from > > plug- in to > > video-stream.)http://groups.google.com/group/microdia/web/usb-sniffing-on > >-windows > > > > BTW I have a nice python script to extract the sensor_init. No need for > > > > copying the values with grep and hands-on anymore. > > sorry but my English is not so advanced and I don't understand this > sentence... > > > GWater > > > > signature.asc > > < 1KWyświetlPobierz > > Ok I get this log it's here: > > http://www.eupload.pl/pfiles/2347/0c45_6270_init_start_stop_sequences.rar > > I hope so I do them good > > Mateusz > > --~--~---------~--~----~------------~-------~--~----~ > Lets make microdia webcams plug'n play, (currently plug'n pray) > To post to this group, send email to [email protected] > Visit us online https://groups.google.com/group/microdia > -~----------~----~----~----~------~----~------~--~---
Thank you. This explains why it didn't work, gives us the data we need but also rasies some questions. (These questions are not for you - just in general.) 1. The webcam didn't work because it has the slave ID 0x48. 2. The *.inf claims it is the mt9v111 sensor. However the senor_init looks like the mt9v112 to me. 3. This is important because we need to probe for the sensor and these two have different serial-numbers. 4. Hopefully only mt9v112 needs to be fixed and then everything works. GWater
signature.asc
Description: This is a digitally signed message part.
