I have written some blog articles, which are more suitable for reference for brothers who are just getting started like me. The following are related titles. Everyone is welcome to discuss and learn, ...
When there is no work to be done, WinCE will enter the kernel's idle thread. If the driver has a thread to work at this time, does it need to switch the process to device.exe? Is this kind of switchin...
There have been many activities in the forum recently, and they are also quite a lot of forms. Yesterday's F7 made so many people drool. First of all, I would like to make two suggestions for the acti...
I am using the FlashPlay7 for PPC plug-in in WinCE. I copied the installed flash.dll file to the PC and referenced this flash.dll in the project. However, this dll is not an OCX control. How can I dis...
I want to use an integrated receiver to make an infrared obstacle avoidance sensor, but why is it that my transmitter is very far away or even blocked, but the receiver still outputs a low level. Some...
In EVC, I use the setpixel function to set the color of each pixel of a bitmap. The same code can be run on VC and get the correct result, but it does not work when run on EVC. The compilation can pas...
There are many different ways of human-computer interaction. The more common ones are listed below:
Mouse interaction: Using a mouse to operate a computer and interact was the most common human...[Details]
On August 25th, SK Hynix announced that it has completed development and entered mass production of its 321-layer, 2Tb QLC NAND flash memory product. This achievement marks the world's first applic...[Details]
On August 20th, Tiantai Robotics Co., Ltd., along with strategic partners including Shandong Future Robotics Technology Co., Ltd., Shandong Future Data Technology Co., Ltd., and Gangzai Robotics Gr...[Details]
As the scale and business applications of national e-government networks continue to expand, the data and services transmitted over them are becoming increasingly sensitive and critical. To protect...[Details]
introduction
According to the China Fire Statistics Yearbook, electrical fires accounted for more than 30% of fire accidents in the past decade, and the trend is increasing year by year. They ...[Details]
Normally, we determine our location and where we want to go by comparing our surroundings with observation and simple GPS tools. However, this kind of reasoning is very difficult for self-driving c...[Details]
A multilevel inverter converts a DC signal into a multilevel staircase waveform. Instead of a straight positive-negative output waveform, the output waveform of a multilevel inverter alternates in ...[Details]
A pure sine wave inverter has a good output waveform with very low distortion, and its output waveform is essentially the same as the AC waveform of the mains power grid. In fact, the AC power prov...[Details]
Charging is an essential topic for electric vehicles. Batteries are a core component of new energy vehicles. So, what's the optimal charge level for electric vehicles? Based on current battery tech...[Details]
Smartphones can be incredibly unintelligent. For example, consider an office full of people, each absorbed in their work. Suddenly, the silence is broken by a burst of loud pop music. A colleague's...[Details]
At present, the most troubling thing about pure electric vehicles as new energy sources is not only the range anxiety, but also the disadvantage of long charging time. At present, ternary lithium b...[Details]
According to foreign media reports, Apple is secretly evaluating several artificial intelligence hardware concepts, including smart home displays, security devices and a desktop robot, of which the...[Details]
The power battery is a crucial component for vehicles, determining its lifespan and range. According to national regulations, when the capacity of an electric vehicle's power battery drops below 80...[Details]
The field of AI is constantly evolving. We are witnessing a profound shift from the era of "generative AI" to the era of "agent AI." This transformation has the potential to reshape industries an...[Details]
On August 19, according to foreign media Cyber Security News reported yesterday, a cybersecurity researcher discovered that hundreds of publicly accessible TeslaMate installation programs are leaki...[Details]