Recently, I used stm32f407 to make a project of audio transmission after decoding mp3 from sd card. The sound card chip used was VM8978, i2s of SPI3 was adopted, and the DMA used was stream5 channel 0...
I just entered the power supply circle. During my internship, I did push-pull. I boosted 18~36V to 450V for stabilization. I added an inductor at the back end, but the spike was very large. I added an...
First, I will make a remote control device. I need to use the materials. I don't know how to use the two. Is it the same as the general connection method? Or are they paired with each other? Thank you...
I have a program that uses an ATmega16 microcontroller. I want to collect external signals through 74hc165, but I can't do it. Can anyone give me some advice? I used the ICCAVR compilation environment...
When PB4.2 downloads the wince system image, the DNW settings should be fine. When using the network port to download, I always cannot find the available network port device when configuring Target->c...
A state machine needs to be saved when power is off. You can program the flash, but it is more troublesome. Are there any special registers that are free?...
With the advancement of computer technology, the development of image processing and pattern recognition methods, fingerprint processing technology has become more mature and has been widely used i...[Details]
WiMax technology needs to demonstrate its advantages in specific application scenarios in order to gain market recognition, which requires application testing to measure system performance para...[Details]
0 Introduction to the direct method of feedback linearization based on dynamic equilibrium state theory
The basic idea of the direct method of feedback linearization based on dynamic equilib...[Details]
Compared with traditional light sources, light-emitting diodes (LEDs) have many advantages, such as low operating voltage, high energy efficiency, small size and directional light. They can provide...[Details]
introduction
The data detected by various measuring instruments often need to be transferred to the PC for data processing and archiving, so as to make full use of the rich hardware and softwa...[Details]
introduction
Cars are becoming an indispensable part of people's lives. However, what worries car users is that the theft of cars is increasing year by year. This paper aims to design a conven...[Details]
Preface
In recent years, many compact portable electronic products have been developed, such as mobile phones, digital cameras, MP3, MP4, PDA, GPS and DVD, etc. They are not only small in size...[Details]
1. What is fading?
In terms of scope, fading can be roughly divided into three types: large area fading, small area fading and indoor fading. As shown in Figure 1, large area fading refers t...[Details]
Most
embedded
systems are powered from a 48V backplane. This voltage is typically stepped down to a lower intermediate bus voltage of 24V, 12V, or 5V to power the circuit board racks withi...[Details]
Abstract This paper
introduces a wireless radio frequency transmission chip nRF9E5 based on 8051 core. The remote control system of flapping-wing micro-aircraft is made by using this chip. Th...[Details]
Abstract: This paper introduces the controller, interface, display principle and driving method of the handheld computer LCD display based on the SA1110 microprocessor. Combined with the HPC projec...[Details]
FSK (Frequeney-Shift Keying) uses carriers of different frequencies to transmit digital signals. FSK signals have the advantages of strong anti-interference ability and long transmission distance, and...[Details]
Mesh network architecture and advantages
The Internet is a flat network. The routers that make up the Internet are on the same plane. The mesh network formed by multiple paths between ...[Details]
0 Introduction
Electric vehicles are high-tech products that integrate computer technology, communication technology, electronic technology, and new material technology. They have a complex ...[Details]
Development Status
Looking at the development of security monitoring technology: from the first generation of analog monitoring, to the second generation of digital monitoring, and then up...[Details]