-
1. Principle 1. Infrared emission protocol There are many infrared communication protocols. This experiment uses the NEC protocol. This protocol uses PWM modulation and uses pulse width to represen...[Details]
-
Today, under the guidance of a low-level expert, I learned how to configure the PWM module! Woof! First open the file configured last time, as follows: Then, we need to use TIM1 to set PWM: Then,...[Details]
-
UART has three operation modes: polling mode, interrupt mode and DMA mode. Chip: STM32F103C8T6 Application Pin: Output: PA0, PA1 USART1 Configuration interface Add interrupt configuration Add DMA...[Details]
-
Remarks: Focus on IoT application development and share IoT technology experience. Software platform: IAR6.5 TCP/IP protocol stack: LWIP1.4.1 Hardware platform: STM32F103C8T6 wired communication ...[Details]
-
introduction In the general project development process, two or more microcontrollers are often required to communicate to complete data transmission. For example, a quadcopter wirelessly transmits d...[Details]
-
Artificial intelligence
There is no inherent bias in AI. It does not "think" something is true or false for reasons that cannot be explained by logic. Unfortunately, human bias exists in mach...[Details]
-
I slightly changed the lyrics of Yu Quan's song "Running", which seems to be
a reflection of the current state of
Huawei Cloud
. At the annual Huawei Analyst Conference held on April 17,
Zh...[Details]
-
In most countries, the military is a fairly large group, and the health of soldiers is particularly important to the combat effectiveness of the army. The US Department of Defense's Advanced Resear...[Details]
-
At present, in the world,
the construction of
smart cities
is in the process of gradually landing from concept, and technology giants and investment giants are important participants in this...[Details]
-
Superconductors have physical properties such as zero resistance effect, Meissner effect and Josephson effect, which make them have broad application prospects and unparalleled advantages in many b...[Details]
-
This routine is also a classic routine on the development board. I modified the framework of the program to make it more suitable for future calls. The specific 4*4 keyboard scanning principle is rel...[Details]
-
In mid-to-late 2016, a girl from Hubei came to Beijing alone, full of curiosity about
cloud computing
. The girl left the deepest impression on me was her lovely smile. She told me that if ...[Details]
-
Here is the temperature added in the previous chapter The above figure is the temperature calculation formula: where Vsense is the ADC value collected from the temperature channel. The stm32f407 ...[Details]
-
unsigned char num,i,j; unsigned char passwordtemp ; //Maximum input is 16 unsigned char inputtimes; //Number of incorrect password inputs unsigned char passwordlength...[Details]
-
Since 2018, the field of artificial intelligence chips has been very lively. Especially in China, the rich vertical application scenarios have provided fertile ground for the development of AI chip...[Details]