I configured the adc channel of stm32f030 as timer triggered interrupt mode and enabled the adc interrupt. I added a variable ADC_conver in the interrupt as the interrupt completion flag, but found th...
How to determine the resistance and capacitance of the active filter? I only know the upper and lower cut-off frequencies of the filter. How to determine the resistance and capacitance? It would be be...
STM32 USART2 sends a total of 3 characters {0x55, 0x55, 0x55}, but the first character received by the serial port debugging assistant is always 00, and then two 0x55 are displayed. Please help me fin...
Smart home networks are emerging, and so are the new applications that support them. Smart lighting systems are a particularly promising use case. This blog post will share tips for developers on how ...
The full name of standing wave ratio is voltage standing wave ratio, also known as VSWR and SWR, which is the abbreviation of Voltage Standing Wave Ratio in English. It refers to the ratio of the stan...
Author: Joshua Zhu, ST engineer
Click to download the pdf document to view:Keywords: local_name, device_name Chinese nameQuestion: Customers often ask how to broadcast a Bluetooth name in Chinese
ST e...
If the ultimate form of a car is a silicon-based life form, then in
the field of
intelligent driving
, it has gradually taken on the appearance of a "veteran driver." In
the field of
the ...[Details]
As the number of cars increases, environmental pressures are also increasing. At this time, some people are saying that new energy vehicles are energy-efficient and environmentally friendly, and ar...[Details]
On August 20th, Tiantai Robotics Co., Ltd., along with strategic partners including Shandong Future Robotics Technology Co., Ltd., Shandong Future Data Technology Co., Ltd., and Gangzai Robotics Gr...[Details]
Based on the commutation technology, thyristor rectifiers are classified into two main types. Line-commutated and force-commutated inverters are commonly used, while other commutated inverters, nam...[Details]
Coal mines typically contain gas and coal dust. When gas and coal dust reach a certain concentration, they can cause explosions. Electrical equipment generates arcs during normal operation or durin...[Details]
A patent disclosed by Ford proposes replacing traditional segmented side curtain airbags with integrated full-width side curtain airbags that span the side of the vehicle and can be deployed simult...[Details]
Bosch has released a new SoC series to support L2+ advanced driver assistance functions. The chip integrates high resolution and long-range detection capabilities, and has built-in support for neur...[Details]
Charging is an essential topic for electric vehicles. Batteries are a core component of new energy vehicles. So, what's the optimal charge level for electric vehicles? Based on current battery tech...[Details]
Electronic scales are a product of modern electronics development. Due to their simplicity, convenience, and high precision, they are widely used in various fields of industry and daily life. Based...[Details]
Electronics Fan Network reported that on August 6th, Shanghai Fourier Co., Ltd. officially launched the GR-3, the third-generation intelligent humanoid Care-bot in its GRx series, in Beijing. This ...[Details]
Bourns®
PEC04
, PEC05, and PEC06 model series, with IP40 protection rating, provide a rugged, space-saving position sensing solution for a variety of electronic devices.
August 1...[Details]
On August 10th, Ni Guangnan, an academician of the Chinese Academy of Engineering,
stated at the
2025 World
Robotics
Conference that
artificial intelligence
is currently
leading profo...[Details]
In 1799, Alessandro Volta demonstrated electrical energy storage technology; a century later, Guglielmo Marconi proved that radio waves could transmit across oceans.
The IEEE ...[Details]
On August 15, overseas intellectual property media IP Fray reported last week that Nokia has filed a patent infringement lawsuit against Geely Group and its four major brands - Zeekr, Lynk & Co, Lo...[Details]
4. Strict security management
(1) Strictly set personnel operation permissions
The permissions of each user should be strictly assigned according to actual needs. The principle of permi...[Details]