For example, there is a unisigned int x and a uchar y[3]. To convert X into a compressed BCD code and put it into Y, this 8-bit machine has no BCD related instructions, no multiplication and division ...
Problem 1: When compiling Android 4.0.4 source code on 32-bit Ubuntu 12.04, an error about the emulator occurred. The key is the -m64 parameter in its Makefile. Just replace it with -m32. The error pr...
Abstract: The application of non-contact measurement system in vehicle road test is studied. A portable vehicle motion parameter . Important issues such as system configuration, test principle, calcul...
For 80,000
ZTE
(000063.SZ) employees and more Chinese ICT (information and communication technology) industry practitioners, the news from across the ocean on the evening of April 16 kept t...[Details]
In the actual project development process, we often need to get the running time of a section of code. The usual method is to use an oscilloscope to measure it. This blog post will use SysTick to acc...[Details]
Recently, the " ZTE
incident"
caused by the Sino-US trade war
has caused heated discussions in the electronics industry. It not only reflects that Chinese companies are lagging behind in the...[Details]
In Windows environment, the source code is encoded in UTF-8. If the source file created by STM32CubeMX contains Chinese comments, then using STM32CubeMX to regenerate the source code will cause the C...[Details]
Timing and protocol are two key points in digital system debugging, and they are also where logic analyzers can play their most valuable role. How can we use a logic analyzer to quickly complete wiri...[Details]
With the development of information technology, intelligence, informatization and networking have become the development trend of modern industrial control. Since the 1980s, the rapid development...[Details]
WPG Holdings announced that its subsidiary Youshang has launched a wireless smoke alarm solution based on STM and Semtech . With the development of the national economy and the enhancement of...[Details]
The STM32 watchdog has two WWDG and IWDG. The biggest difference between the two is that IWDG has only one lower limit for feeding, while WWDG, as the name implies, must be fed within a range to ensu...[Details]
Ouster LiDAR OS-1 (left) and OS-2 (center) Velodyne invented the modern 3D LiDAR scanner in the mid-2000s, but in recent years conventional wisdom has held that Velodyne’s design — 64 lasers mounted...[Details]
Summary of STM32 peripheral DMA usage: 1. Select DAM mode according to your needs: (1) Circular mode—DMA_Mode = DMA_Mode_Circular (2) Normal mode—DMA_Mode = DMA_Mode_Normal 2. For Chanel3 of DMA1, t...[Details]
/* Unfortunately, it cannot generate a standard 38kHz frequency square wave, there is a little error*/ #include reg51.h #define uchar unsigned char #define uint unsigned int sbit Waveout=P1^0; //P...[Details]
Table of contents: 1 Overview 2: Common interrupt functions 3: PWM output 1 Overview In development, timers are widely used, which can be simply summarized into three aspects: 1.1: Application of ...[Details]
As shown in the figure, the circuit is required to count and display the number of times the button is pressed. When the button is pressed once, the count value increases by 1 (it is required to accu...[Details]