Document Revision History .................................................................................................... 25
9
Index ............................................................................................................................................... 26
Recently, the police in Shenzhen and Guangzhou destroyed two large counterfeiting dens named "Shenzhen Xian× New Life Technology Co., Ltd." and "Guangzhou Yue× Electronics Factory", including factorie...
Without an operating system, when I use the following program to create a TCP client in Keil, there will always be a problem (FaultISR) in the tcp_connect() function, but it works in IAR. Why? The lwi...
[i=s]This post was last edited by paulhyde on 2014-9-15 09:18[/i] Hello everyone! Please wait a little longer, the analysis of the 2007 Electronic Design Competition F (Car Seesaw) will be online soon...
On April 24, Sungrow released its annual financial report. The report shows that in 2017, Sungrow's global shipments reached 16.5GW, of which domestic shipments reached 13.2GW, a year-on-year incre...[Details]
1. Principle 1. Infrared emission protocol The infrared transmission protocol has been written in the previous article , so I will not repeat it here. 2. Timer counting and input capture A timer...[Details]
0. Preparation First use st-link to connect the stm32 core board and PC for burning St-link Stm32 3.3V 3.3V GND GND SWDIO PART SWCLK DCLK Then connect with USB serial port board to v...[Details]
I have been working on this i2c for several days. Many people on the Internet say that this is a problem with the ST package library, and they basically talk about the STM32F1 series of chips, and ev...[Details]
Recently, the relevant person in charge of the Energy Conservation Division of the Energy Conservation and Technology Equipment Department of the National Energy Administration said on the issue of...[Details]
The Wassenaar Arrangement, everything started during the Cold War. Let's learn more about it with the embedded editor.
background
After the end of World War II, the United States ...[Details]
In the development of artificial intelligence, talent reserve is undoubtedly an important part. Artificial intelligence should be a bottom-level technology that can be deeply embedded in any indust...[Details]
Autonomous driving
and
5G
are the two hot topics that global companies and media are paying the most attention to, and the combination of the two is the focus of everyone's attention....[Details]
This program mainly uses the comparison output function of the timer to generate PWM waves to control the LED. The comparison output of timer A corresponds to P2.3 P2.4. Therefore, a matching working...[Details]
1. Brief description A summary of "How to build uClinux kernel transplantation on ARMSYS development board with S3C44B0X as core", including the analysis of Bootloader function and the key co...[Details]
First of all, security practitioners have never felt that AI can be used as deeply as today. Although Antelope Cloud is a platform manufacturer, it has always been interested in AI and AI- specific...[Details]
Different models of PIC series microcontrollers have different watchdog settings. The following takes the PIC16F688 microcontroller as an example. 1. If WDTE=1 in the configuration word, the watchdog...[Details]
STM32 has two watchdogs: independent watchdog and window watchdog. This article mainly introduces the use of independent watchdog. Independent watchdog (IDWG): driven by an independent 40KHZ low-sp...[Details]
The key is the configuration of registers. The T1 timer (16 bits) of CC2530 needs to configure three registers: T1CTL, T1STAT, IRCON Here is just a brief introduction. For more details, please refer ...[Details]
****************************************************************** 1. The operand is in register, R0--R7 2. Operands are in internal RAM 3. Operands are in external RAM But they are all similar. For ...[Details]