RISC-V Processor Design Series : https://training.eeworld.com.cn/course/5612This video is a series of courses, mainly using the open source Hummingbird E203 processor as an example to explain RISC-V p...
I attended the annual RT-Thread Developer Conference in Shenzhen last weekend, and this week I plan to port an operating system to the NUCLEO-L552ZE development board.
Conclusion first: System transpl...
The basic idea of the algorithm is: find the vertex closest to the source point each time, then expand with this vertex as the center, and finally get the shortest path from the source point to all ot...
#include "config.h"#include "delay.h"#include "uart.h"unsigned int INT0_cnt=0, INT1_cnt=0; //Count variablesbit key=P5^5 for test;/************* Function description***********************************...
The IP resources shared by Synopsys in this issue include the latest technical solutions and cutting-edge technology interpretations in three major industries.AI
AI+ML, let chip verification end this ...
I can't select the copper part after the ad is covered. I created it on the top layer and immediately selected it. I tried it on other layers, but they can't be selected after they are created. I can ...
VHF module properties
This module is a highly cost-effective wireless voice intercom and data transmission module, with built-in high-performance RF transceiver chip, microcontroller and...[Details]
1. Background Video analysis is widely used in the field of sports. Coaches and athletes can carefully study the details of the game by controlling the segmentation, playback, and pause of the game v...[Details]
0 Preface
The USB3.0 high-speed data acquisition system, with its 5Gbps bandwidth and plug-and-play performance, is gaining more and more attention. Currently, the commonly used USB3.0 communication ...[Details]
Since the advent of the world's first GaN-based blue
LED
in 1993
, the development of LED manufacturing technology has been remarkable. Currently, all commercialized GaN-based LEDs are ma...[Details]
In the 51 single-chip microcomputer's on-chip data memory units 20H and 21H, the data 9 and 2 are stored respectively. Write a program to calculate the difference and product between the two. The d...[Details]
CAN bus technology has been widely used in automobiles. With the promotion of new energy vehicles and autonomous driving technology, bus problems have also brought risks and challenges to the safety ...[Details]
The circuit is very simple and it only took me a little over an hour to complete. The effect is pretty good, right?
This is the shake stick:
Close-up of the sensor. Think ...[Details]
Pseudo-instructions do not belong to the instruction system of the microcontroller, but are instructions provided by the assembler, which are used to adjust the location of the program in the memory,...[Details]
An oscilloscope is an electronic measuring instrument with a wide range of uses. It can transform electrical signals that are invisible to the human eye into visible images, making it easier for peop...[Details]
As a "lifesaver" for computers
in case of sudden power outages
, UPS has been used by more and more users. However, as a relatively sophisticated device, how to use and maintain...[Details]
When it comes to 5G technology, we have always paid more attention to the progress in terminals, such as which company has launched a new 5G mobile phone, and which chip supports 5G networks quic...[Details]
We're still a long way from becoming self-driving vehicles, and most of us aren't eager to give up control of the steering wheel. A recent survey by the American Automobile Association showed that mo...[Details]
Apple is hiring a business development manager with experience in alternative payments, including cryptocurrencies, according to a recent job posting. In a job listing spotted by CoinDesk, Apple re...[Details]
When using stm32, spi3 and jtag ports overlap. If you want to use spi3 or use the jtag port as a normal io port, you can refer to the following configuration:
1. Use the spi3 interface and refer to t...[Details]
1. Causes and consequences of missed detection and misjudgment Penetrant testing mainly consists of 9 major links: pre-cleaning, drying, penetration, pre-water washing, emulsification, water washing,...[Details]