-
On April 17, the U.S. Department of Commerce suddenly announced that it would completely ban U.S. companies from
selling parts, goods, software and technology
to
ZTE
within 7 years. This als...[Details]
-
For 80,000
ZTE
(000063.SZ) employees and more Chinese ICT (information and communication technology) industry practitioners, the news from across the ocean on the evening of April 16 kept t...[Details]
-
1. Principle 1. Infrared emission protocol The infrared transmission protocol has been written in the previous article , so I will not repeat it here. 2. Timer counting and input capture A timer...[Details]
-
In the actual project development process, we often need to get the running time of a section of code. The usual method is to use an oscilloscope to measure it. This blog post will use SysTick to acc...[Details]
-
The trade war between China and the United States has become the focus. The United States has begun to play the ban card against Chinese technology companies. The ZTE incident shows that if the ban...[Details]
-
Artificial intelligence
There is no inherent bias in AI. It does not "think" something is true or false for reasons that cannot be explained by logic. Unfortunately, human bias exists in mach...[Details]
-
Timing and protocol are two key points in digital system debugging, and they are also where logic analyzers can play their most valuable role. How can we use a logic analyzer to quickly complete wiri...[Details]
-
In most countries, the military is a fairly large group, and the health of soldiers is particularly important to the combat effectiveness of the army. The US Department of Defense's Advanced Resear...[Details]
-
The photovoltaic inverter is the core equipment of the photovoltaic system. Its main function is to convert the direct current generated by the photovoltaic modules into alternating current that meets...[Details]
-
STM32 uses FSMC to read and write CPLD programs. CPLD is hung on the address line and data line of STM32. CPLD is regarded as an off-chip RAM for reading and writing. On the board I made, CPLD is hun...[Details]
-
I believe that many netizens who have watched "Interstellar" will remember this classic line, "Do not go gentle into this good night, nor let passion be drowned by the gloom of twilight". Different...[Details]
-
STM32 has two watchdogs: independent watchdog and window watchdog. This article mainly introduces the use of independent watchdog. Independent watchdog (IDWG): driven by an independent 40KHZ low-sp...[Details]
-
/* Unfortunately, it cannot generate a standard 38kHz frequency square wave, there is a little error*/ #include reg51.h #define uchar unsigned char #define uint unsigned int sbit Waveout=P1^0; //P...[Details]
-
unsigned char num,i,j; unsigned char passwordtemp ; //Maximum input is 16 unsigned char inputtimes; //Number of incorrect password inputs unsigned char passwordlength...[Details]
-
MCU Programming: Find the average value of 8 unsigned numbers. There are 8 unsigned numbers stored in 8 units of the internal RAM starting at 20H. It is required to save their average value in R2. ;-...[Details]