Does anyone have the firmware library for f103ze v1.3.0? I have been looking for it for a long time and only found v2.03 v3.0.0 and v3.5.0 but not v1.3.0. Please help me...
Summary notes on learning McBSP module of TMS320F28335 1. How many McBSP interfaces are there in total? How many pins are there in each McBSP interface? TMS320F28335 has two McBSP interfaces in total....
This is my first time to write a program to read and write IC cards, and I have a few basic questions to ask. 1. When writing data to a block, a lot of verification must be done before writing, such a...
Hello everyone, I am a beginner, using Samsung 2440, and encountered the following error BUILD: [01:0000000045:ERRORE] NMAKE : U1073: don't know how to make 'E:\WINCE500\platformew2440\lib\ARMV4I\debu...
Has anyone made an amplifier and comparison circuit? I've been working on something that needs a comparison circuit, but I just can't figure it out. It's so annoying. It seems that the chip uses lm386...
I modified the LCD driver function myself, and the project compilation and linking were fine. After downloading it to the stm32 board, the LCD screen was white, and the reset, power-off, and power-on ...
There are many different ways of human-computer interaction. The more common ones are listed below:
Mouse interaction: Using a mouse to operate a computer and interact was the most common human...[Details]
A parallel inverter consists of two thyristors (T1 and T2), a capacitor, a center-tapped transformer, and an inductor. The thyristors provide a current path, while the inductor L maintains a consta...[Details]
In recent years, many people have switched to new energy vehicles, and this type of vehicle has indeed been highly sought after and is considered the future direction of automobile development, and...[Details]
Today's security industry has entered the era of massive networking. Many enterprises, especially financial institutions, have established multi-level video surveillance networking platforms. Lever...[Details]
The automotive industry in 2025 is undergoing a thorough intelligent reshuffle.
Geely wants to make changes in the field of AI cockpits: in the future, there will be no traditional smart...[Details]
As the scale and business applications of national e-government networks continue to expand, the data and services transmitted over them are becoming increasingly sensitive and critical. To protect...[Details]
Electric vehicles are now widespread, but they've brought with them a host of problems, the most prominent of which is charging. Small electric vehicles (EVs) are a new form of transportation in a ...[Details]
Normally, we determine our location and where we want to go by comparing our surroundings with observation and simple GPS tools. However, this kind of reasoning is very difficult for self-driving c...[Details]
With the increasing number of new energy vehicles on the road, the deployment of supporting facilities for these vehicles has accelerated, and new energy vehicles have gradually entered the vision ...[Details]
Chinese characters are extensive and profound, and there are many different names for ESD tubes. How many of them do you know?
As far as I know, ESD diodes are currently known as ESD p...[Details]
In the field of intelligent driving, regulations are becoming increasingly stringent, and the technical threshold continues to rise. Especially after the traffic accident in March 2025, the Ministr...[Details]
In daily life, when we purchase a transformer, we are faced with the installation and wiring procedures. Generally speaking, large transformers such as power transformers are equipped with speciali...[Details]
As my country's industrialization continues to improve, environmental pollution is also facing tremendous pressure. In recent years, national environmental protection policies have become increasin...[Details]
With the improvement of China's supporting infrastructure and the accumulation of technology and capital, demand for industrial automation and intelligent applications of machine vision technology ...[Details]
On August 19, according to foreign media Cyber Security News reported yesterday, a cybersecurity researcher discovered that hundreds of publicly accessible TeslaMate installation programs are leaki...[Details]