-
There are many different ways of human-computer interaction. The more common ones are listed below:
Mouse interaction: Using a mouse to operate a computer and interact was the most common human...[Details]
-
While
the solid-state battery
industry is still engaged in a long technological marathon for
the "ultimate solution" for
electric vehicles
, some companies have begun looking for mor...[Details]
-
1 Introduction
In the mid-1960s, American scientist Maas conducted extensive experimental research on the charging process of open-cell batteries and proposed an acceptable charging curve for ...[Details]
-
As the scale and business applications of national e-government networks continue to expand, the data and services transmitted over them are becoming increasingly sensitive and critical. To protect...[Details]
-
Normally, we determine our location and where we want to go by comparing our surroundings with observation and simple GPS tools. However, this kind of reasoning is very difficult for self-driving c...[Details]
-
1. Fault phenomenon and cause analysis
1. During the operation of the equipment, the expansion sleeve is subjected to a large torque, and the mating surfaces of the shaft and the sleeve move...[Details]
-
In the field of communications power supplies, AC/DC rectifier power supplies are called primary power supplies or basic power supplies, while DC/DC converters are called secondary power supplies. ...[Details]
-
01. Introduction
As in-vehicle networks migrate from the CAN
bus
to
Ethernet
, traditional millisecond-level synchronization accuracy can no longer meet the requirements of mul...[Details]
-
As the core of electric vehicles, batteries are concerned with vehicle use and maintenance. The operation of vehicles is guaranteed by the electricity generated by batteries. For batteries, battery...[Details]
-
Industrial equipment plays a significant role in improving industrial automation and accelerating production efficiency. Industrial HMIs (Human-Machine Interfaces) serve as a communication platform...[Details]
-
introduction
Due to their flexibility and security, Java cards are increasingly being used in the smart card field. Once a Java card is released, if multiple applications need to call the same...[Details]
-
On August 19, according to foreign media Cyber Security News reported yesterday, a cybersecurity researcher discovered that hundreds of publicly accessible TeslaMate installation programs are leaki...[Details]
-
Modern automotive electronics have entered a new phase of fundamental change and advancement, evolving from the application of electronic components to in-vehicle electronic systems. Sensors are on...[Details]
-
Security Use Cases and Implementation: Ensuring Future Security
By Manoj Rajashekarah, Chief
summary
In our previous article, "Securing the Future of Robotics: The Role of Cy...[Details]
-
On August 8th, the World Robotics Conference 2025 (WRC 2025) grandly opened at the Beijing Beiren Yichuang International Exhibition Center. Co-hosted by the China Electronics Society and the World ...[Details]