The MSP430FR5969 LaunchPad not only supports the latest MCUs with integrated non-volatile FRAM memory technology, but also supports the latest MCUs with integrated non-volatile FRAM memory technology....
Dear experts: I have never worked on embedded systems, but now I have a project to implement the following functions: Use the GPIO of LM3S9D90 to simulate a 24-bit Slave SPI to receive information fro...
When burning the program, you mistakenly select "cold start" and the program can only be downloaded when P3.2/P3.3 is 0/0, but your own program outputs a high level.
You can short-circuit P3.2/P3.3, a...
[i=s]This post was last edited by xiaowei1234 on 2020-3-4 15:14[/i]1. Source code of OBD communication based on STM32
2. Support CAN bus communication, K line communication, L line communication
3. Su...
I am currently working on a BCH decoder, and my boss requires me to use a table lookup method to replace the multiplier in the Galois Field. Since it is an m=14 Galois Field, the table needs more than...
Cortex-M3 USB module and SST25 series Flash storage
1. The Cortex-M3 core LM3S37xx series microprocessors have built-in USB interfaces for Device/Host/OTG, which is very convenient. Generally, when us...
There are many different ways of human-computer interaction. The more common ones are listed below:
Mouse interaction: Using a mouse to operate a computer and interact was the most common human...[Details]
If the ultimate form of a car is a silicon-based life form, then in
the field of
intelligent driving
, it has gradually taken on the appearance of a "veteran driver." In
the field of
the ...[Details]
As the scale and business applications of national e-government networks continue to expand, the data and services transmitted over them are becoming increasingly sensitive and critical. To protect...[Details]
One of the most core components of electric vehicles is the motor. The power supply provides electrical energy to the motor, which converts this electrical energy into mechanical energy, which in t...[Details]
Normally, we determine our location and where we want to go by comparing our surroundings with observation and simple GPS tools. However, this kind of reasoning is very difficult for self-driving c...[Details]
1. Fault phenomenon and cause analysis
1. During the operation of the equipment, the expansion sleeve is subjected to a large torque, and the mating surfaces of the shaft and the sleeve move...[Details]
China, August 21, 2025 – STMicroelectronics (NYSE: STM), a world-leading semiconductor company serving a wide range of electronics applications, has published its IFRS 2025 semi-annual financial re...[Details]
In the field of communications power supplies, AC/DC rectifier power supplies are called primary power supplies or basic power supplies, while DC/DC converters are called secondary power supplies. ...[Details]
Puttshack's Trackaball uses the Nordic nRF54L15 system-on-chip (SoC) to monitor sensors and enable Bluetooth low energy connectivity, while the nPM2100 power management integrated circuit (PMIC) ...[Details]
introduction
The rapid adoption of computers has led to a growing number of tasks being performed on them. People from all walks of life, especially programmers and writers, are spending incre...[Details]
01. Introduction
As in-vehicle networks migrate from the CAN
bus
to
Ethernet
, traditional millisecond-level synchronization accuracy can no longer meet the requirements of mul...[Details]
On August 20, it was reported that the specifications of Intel's upcoming Panther Lake mobile processor appeared on the Intel GFX CI website, which mainly focuses on Intel's open source Linux drive...[Details]
Today, the voltage of electronic products continues to rise to 400V, 600V and even 1000V, so there are few electronic load models that can handle such high voltages. Many people consider connecting...[Details]
With rapid economic development, the types of pollution sources are increasing, especially in chemical and industrial zones and their surroundings. The patterns of pollution and the types of ecolog...[Details]
On August 19, according to foreign media Cyber Security News reported yesterday, a cybersecurity researcher discovered that hundreds of publicly accessible TeslaMate installation programs are leaki...[Details]