-
1. Principle 1. Infrared emission protocol There are many infrared communication protocols. This experiment uses the NEC protocol. This protocol uses PWM modulation and uses pulse width to represen...[Details]
-
When the domestic discussion about "ZTE being banned" was hot, Alibaba officially announced the acquisition of chip supplier
Zhongtianwei
, but the investment amount was not disclosed. At t...[Details]
-
Today, under the guidance of a low-level expert, I learned how to configure the PWM module! Woof! First open the file configured last time, as follows: Then, we need to use TIM1 to set PWM: Then,...[Details]
-
Security PPP is a new model of urban video surveillance projects: 1) The government and social capital establish a project company in a certain proportion; 2) The project company participates in the ...[Details]
-
Although it is early summer, the Chinese smartphone market is still in the cold winter, just like Beijing in April with snow. For mobile phone brands caught in the middle, the cold is even more bit...[Details]
-
Superconductors have physical properties such as zero resistance effect, Meissner effect and Josephson effect, which make them have broad application prospects and unparalleled advantages in many b...[Details]
-
This example is mainly to familiarize yourself with the register configuration of Timer A and the configuration method of IAR. /*********************************************** Program function: re...[Details]
-
This program uses the eight-channel ADC single acquisition mode. According to the configuration, ADC12SC will automatically reset after the conversion is completed in the single mode, so it is necess...[Details]
-
At the beginning of the new year of 2018, after the release of the national photovoltaic policy, we found that the state’s support for village-level poverty alleviation power stations has not weake...[Details]
-
With the development of information technology, intelligence, informatization and networking have become the development trend of modern industrial control. Since the 1980s, the rapid development...[Details]
-
On May 8,
Google
I/O 2018 Developer Conference was held as scheduled in Mountain View, California. In the second year of the full promotion of the "AI first" strategy, artificial intelligen...[Details]
-
I used the bit definition in my 51 program: bit flag. After defining it this way, I ran the program and downloaded it to the circuit board. I found that the flag was not the value I set, which led to...[Details]
-
The Vatican Secret Archives is one of the world's greatest historical collections, but many of its documents have never been transcribed. Recently, a project called Codice Ratio used a
combination...[Details]
-
I have been working on a stm32 project recently and have been struggling with its startup method. I saw a good article and reposted it. The format of the original article is not very good, and there...[Details]
-
1. Common knowledge about DMA. 1. Function: to achieve high-speed data transmission between chips. That is, it can achieve data transmission without occupying the CPU. 2. Mode: There are three tran...[Details]