STMicroelectronics (ST) held its first Industrial Summit in Shenzhen on May 29. The summit was divided into three sub-themes: motor control, power supply and energy, and automation. The summit was a s...
Recently I found a very strange problem: when the chip and the serial debugging assistant send the first time, the chip cannot receive the first character sent, but it can receive all the characters t...
My current 6713 dsp divides 256kiram into two parts: 192k for code and dataand 64k for l2cache.But the speed is still not fast enough.My boss requires 1-2 milliseconds to complete a task, but it takes...
Tektronix recently launched the latest 3 series and 4 series oscilloscopes.
Not only has a large high-definition touch screen
Multi-channel equipped with gold award-winning UI design interprets the pe...
UWB is a brand-new communication technology that is very different from traditional communication technology. Unlike the use of carriers in traditional communication systems, this system transmits dat...
There are many different ways of human-computer interaction. The more common ones are listed below:
Mouse interaction: Using a mouse to operate a computer and interact was the most common human...[Details]
ISP devices, such as field programmable devices (FPGAs and CPLDs), do not require a programmer. Using programming kits provided by the device manufacturer, they employ a top-down modular design app...[Details]
As the main model among new energy vehicles, pure electric vehicles have received strong support and encouragement from the country in recent years, and their development is changing with each pass...[Details]
According to foreign media reports, secondary battery materials company POSCO Future M announced that it has successfully developed two experimental (prototype) positive electrode materials for the...[Details]
This paper proposes a temperature real-time transmission and display solution based on LED optical data transmission, with Jingwei Yager low-power FPGA HR (Yellow River) series as the main controll...[Details]
As the scale and business applications of national e-government networks continue to expand, the data and services transmitted over them are becoming increasingly sensitive and critical. To protect...[Details]
Normally, we determine our location and where we want to go by comparing our surroundings with observation and simple GPS tools. However, this kind of reasoning is very difficult for self-driving c...[Details]
Based on the commutation technology, thyristor rectifiers are classified into two main types. Line-commutated and force-commutated inverters are commonly used, while other commutated inverters, nam...[Details]
Compared to cloud databases, minicomputers are purpose-built for decentralized, rugged computing at the edge of the network. By moving applications, analytics, and processing services closer to the...[Details]
For new energy vehicles, the importance of batteries is unquestionable. Not only does it determine the performance of the vehicle, but the battery density also has a great relationship with the veh...[Details]
Nascent Micro is launching devices covering a wide range of power applications, including gallium nitride (GaN) drivers, dual-channel automotive drivers, and battery protection MOSFETs.
...[Details]
Amid the rapid advancement of automotive intelligence, on-board storage has become a thorny bottleneck restricting the "large-scale popularization" of advanced assisted driving.
On the o...[Details]
Motor potting compound is a high-performance sealing material widely used for motor encapsulation and insulation. It is essential for motor protection and packaging. Its ideal moisture and water re...[Details]
It's not possible to generalize whether one vehicle is good or bad; the definition of "good" varies depending on the environment. Excluding policy support, whether electric vehicles or gasoline-pow...[Details]
On August 19, according to foreign media Cyber Security News reported yesterday, a cybersecurity researcher discovered that hundreds of publicly accessible TeslaMate installation programs are leaki...[Details]