-
In the past few days, the Chinese display panel giant
BOE
has been flooded with articles supported by Liu Shuwei. Let's follow the embedded editor to learn about the relevant content.
...[Details]
-
Unique device identifiers are suitable for: ● Used as a serial number (e.g. USB string serial number or other terminal applications) ● Use the unique ID as a security key when used in conjunction wit...[Details]
-
The day before yesterday, I learned about STM's Systick and found it quite useful for precise timing. When I used CVAVR before, I found that the delay.h in it was very useful. So, I used STM32's...[Details]
-
Recently, the " ZTE
incident"
caused by the Sino-US trade war
has caused heated discussions in the electronics industry. It not only reflects that Chinese companies are lagging behind in the...[Details]
-
In Windows environment, the source code is encoded in UTF-8. If the source file created by STM32CubeMX contains Chinese comments, then using STM32CubeMX to regenerate the source code will cause the C...[Details]
-
1. Basic Concepts of LCD/LCM The structure of Liquid Crystal Display (LCD) is to place liquid crystals between two parallel pieces of glass. There are many vertical and horizontal fine wires between...[Details]
-
This small program is still the use of timer, which is relatively simple. The specific parts are noted in the comments, please refer to the comments. /*********************************************...[Details]
-
As a leading company in automotive semiconductors, Freescale and Khronos Group have jointly launched an automotive multimedia embedded microprocessor i.MX35 with an integrated OpenVG hardware acceler...[Details]
-
WPG Holdings announced that its subsidiary Youshang has launched a wireless smoke alarm solution based on STM and Semtech . With the development of the national economy and the enhancement of...[Details]
-
The STM32 watchdog has two WWDG and IWDG. The biggest difference between the two is that IWDG has only one lower limit for feeding, while WWDG, as the name implies, must be fed within a range to ensu...[Details]
-
1) ADC multi-channel acquisition: (Multi-channel acquisition must use scanning mode. In scanning mode, the channels of the rule group share a register, so DMA transmission must be used; to prevent da...[Details]
-
float ad_value; float value; int main( void ) { WDTCTL=WDTPW+WDTHOLD; //Turn off watchdog BCSCTL1 =CALBC1_1MHz; //Set DCO to 1MHZ DCOCTL =CALBC1_1MHZ; ADC10CTL1=INCH_10; //Select the 10th chan...[Details]
-
In the first quarter of 2014, Inspur's
server
shipment market share reached 19%, ranking first in China and fifth in the global market. This is the first time a Chinese manufacturer has ach...[Details]
-
Cybersecurity is undoubtedly one of the most important topics for IT experts. This is true for security engineers, CISOs, CIOs, and even CEOs. Let’s learn more about it with the security electronic...[Details]
-
The two-byte compressed BCD code is converted to a two-byte binary number. The algorithm is as follows: BCD code abcd=1000a+100b+10c+d=10{10 +c}+d. After separating each BCD code, it can be converted...[Details]