According to the advice of @littleshrimp in this post, I also measured the working current. First, use tweezers to pull the battery plug out of the socket, and then solder two wires on the test points...
[i=s]This post was last edited by HSGhxq on 2019-1-16 14:33[/i] [postbg]2.jpg[/postbg][color=#444444][size=14px][font="]The garage has an electric rolling door installed. It is inconvenient to carry t...
I am using an ADA4891-2 dual op amp, but I am only using one amplifier to amplify the signal by 10 times, leaving the other amplifier unused. The receipt manual says "Connect all unused amplifiers in ...
In the wild this small wind turbine circuit can be used to charge laptops, mobile phones, etc.
The circuit principle is that the bridge rectifier in the front rectifies the electricity from the wind t...
Lichee RV 86 PANEL Review (7) - Deploy a personal blog on Lichee RV
In the previous section, we completed the hexo configuration for the Windos environment and the server deployment on the Lichee side...
【NXP Rapid IoT Evaluation】Environmental Quality Test https://en.eeworld.com/bbs/forum.php?mod=viewthread&tid=1067645&fromuid=194541 (Source: Electronic Engineering World Forum) This paper mainly reali...
South Korea's Hyundai Motor Group and LG Chem are considering setting up a joint venture in Indonesia to manufacture electric vehicle batteries, a source familiar with the matter told Reuters, althou...[Details]
According to DigitalChatStaion, both the Huawei Mate 30 and Mate 30 Pro will use Samsung's AMOLED display panels instead of the panels from LG and BOE used in the Mate 20 Pro. Although it was previ...[Details]
The video surveillance system is a comprehensive system that integrates computer processing technology, network communication technology and digital audio and video encoding and decoding technology...[Details]
Nowadays, many of Google's services are almost all related to AI, such as search, maps, photos, and translation. These AI application services use Google's TPU in the training, learning, and inferenc...[Details]
The chip industry has always been extremely dependent on intellectual property (IP). Especially as IC design enters the system-on-chip (SoC) era, the integration is getting higher and higher, and the...[Details]
What is DMA used for? Direct memory access is used to provide high-speed data transfer between peripherals and memory or between memory and memory. Data can be moved quickly through DMA withou...[Details]
On August 17, Aojie Technology (Shanghai) Co., Ltd. completed the industrial and commercial registration for the establishment of a joint-stock company, and has since been renamed "Aojie Technology C...[Details]
Key points: • The second-generation Snapdragon XR2+ platform supports 4.3K single-eye resolution and 12 or more parallel cameras, bringing a clearer and immersive MR and VR experience. • Sa...[Details]
Switching tube
The switching inverter stage of the switching power supply can have multiple modes. We summarize several situations:
Of course, we are only analyzing how many components a...[Details]
//////////////////////////////////////////////////////// In the 51 single-chip microcomputer, there is a special variable sbit (bit variable) It is very easy to use it to do a variable inversion, nu...[Details]
From June 11th to 15th, Hexagon's manufacturing software landed at the Shanghai National Exhibition and Convention Center, providing a series of software solutions for different stages of the product...[Details]
Overview As an important component of vehicle networking information and communication technology, V2X technology is a key technical means to achieve the integration, intelligent management ...[Details]
In the field of LED lighting, in order to reflect the energy-saving and long life characteristics of LED lamps, it is very important to correctly select LED driver ICs. Without a good driver IC m...[Details]
Introduction: In recent years, with the development of intelligence and networking, the data generated by cars and the exposed interfaces have gradually increased, and data security incidents have ...[Details]