-
The trade war between China and the United States has become the focus. The United States has begun to play the ban card against Chinese technology companies. The ZTE incident shows that if the ban...[Details]
-
Function List and Notes (lower-level driver part) 1. IO port initialization: control IO and communication IO. Control includes power control, reset and low power mode. Communication is the serial po...[Details]
-
ZTE was punished, and Hou Weigui, who had already retired, had to come out of retirement again and run around to mediate. Let's follow the embedded editor to learn about the relevant content.
...[Details]
-
At present, in the world,
the construction of
smart cities
is in the process of gradually landing from concept, and technology giants and investment giants are important participants in this...[Details]
-
Since China began to try to produce panels independently in 1998, in 2018, China's panel industry has gradually upgraded from a marginal industry to the largest production scale. Especially in the ...[Details]
-
I rewrote the main part of this program. The program uses the watchdog as a normal timer and scans the digital tubes in the watchdog interrupt. In addition, I added a display buffer. If you want to d...[Details]
-
STM32 uses FSMC to read and write CPLD programs. CPLD is hung on the address line and data line of STM32. CPLD is regarded as an off-chip RAM for reading and writing. On the board I made, CPLD is hun...[Details]
-
1. Introduction to MC68K CPU The MC683xx series of microcontrollers are composed of the famous MOTOROLA 32-bit microprocessors such as MC68K, 68020, 68040, and the compatible 68K, CPU32, CPU3...[Details]
-
I used the bit definition in my 51 program: bit flag. After defining it this way, I ran the program and downloaded it to the circuit board. I found that the flag was not the value I set, which led to...[Details]
-
In mid-to-late 2016, a girl from Hubei came to Beijing alone, full of curiosity about
cloud computing
. The girl left the deepest impression on me was her lovely smile. She told me that if ...[Details]
-
The Vatican Secret Archives is one of the world's greatest historical collections, but many of its documents have never been transcribed. Recently, a project called Codice Ratio used a
combination...[Details]
-
Summary of STM32 peripheral DMA usage: 1. Select DAM mode according to your needs: (1) Circular mode—DMA_Mode = DMA_Mode_Circular (2) Normal mode—DMA_Mode = DMA_Mode_Normal 2. For Chanel3 of DMA1, t...[Details]
-
Interrupts and timers implement a 24-hour clock. The program is as follows: #include reg52.h #define PORTLEN P0 sbit bit_select = P2^0; sbit seg_select = P2^1; unsigned char src = {0x3f,0x06,0...[Details]
-
Try to design a subroutine, whose function is to rearrange the 6 single-byte positive integers in the internal RAM pointed to by (R0) in ascending order. ;========================================== ...[Details]
-
Requirements: Set timer T1 as an external event counter, count 500 pulses every time, then switch T1 to timing mode and output a positive pulse with a width of 10ms at P1.2. Over and over again. A...[Details]