-
introduction
1 The significance of using RTOS on MSP430
It is understandable that it is meaningless to use RTOS on MSP430. Because the hardware resources of MSP430 are limited (for exampl...[Details]
-
In this article, the high-performance DSP developed by TI can be used as an effective confidentiality method if it is applied to PC encryption cards.
As an effective network security solution,...[Details]
-
In public places such as schools, government agencies, factories and mines, as well as public corridors in residential areas, the phenomenon of long-burning lights is very common, which causes a h...[Details]
-
Introduction
Power subsystems are becoming more and more integrated into the overall system. Power systems have moved from being separate "essential dangerous devices" to being monitorable...[Details]
-
In the previous series, we have listed some basic knowledge of C language in Tables 1 to 3. We hope that beginners can strengthen their memory of the above tables and gradually learn to use them wh...[Details]
-
Contact resistance
is the resistance to current flow through a closed pair of contacts. This type of measurement is performed on devices such as connectors,
relays
, and switches. The...[Details]
-
1 Introduction to HART Protocol
HART (Highway Addressable Remote Transducer), an open communication protocol for addressable remote sensor high-speed channels, was launched by Rosemen in the U...[Details]
-
1. Disadvantages of choosing too high a voltage level
Choosing too high a voltage level will result in too high an investment and a long payback period. As the voltage level increases, the...[Details]
-
In today's body control module (BCM) designs, savvy engineers are moving away from electromechanical relays whenever possible. Their next step is to eliminate fuses. But is eliminating fuses a nece...[Details]
-
Since the late 1990s, with the demand for higher system efficiency and lower power consumption, the technological update of telecommunications and data communication equipment has promoted the deve...[Details]
-
Introduction
Nowadays, people pay more and more attention to the security alarm system, and people have higher and higher requirements for the functions and performance of the alarm. This paper prop...[Details]
-
1 Embedded Systems
Embedded System refers to a collection of computer hardware and software with specific functions or purposes, which is divided into embedded software system and embe...[Details]
-
Our flight had just begun to descend when a gentleman sitting next to me turned to talk to me about engineering—he had seen me reading an engineering journal. The gentleman next to me said that he ...[Details]
-
a. Keep the battery clean, wipe off the spilled electrolyte, contaminated dirt and dust in time; keep the poles and terminal clamps clean and in good contact, and apply vaseline or butter to preven...[Details]
-
1. The composition and structure of mobile phone lithium battery
Mobile phone lithium batteries are mainly composed of plastic shell upper and lower covers, lithium battery cells, protection c...[Details]