Serial screen (touch screen) configuration Software + 51 single-chip Modbus RTU Multi-machine serial communication program source codeRealization of the touch screen (serial screen) and SCM communication, mainly to solve the problem of communication protocols. This paper uses the open Modbus Communication protocol to Guangzhou Hmimaker touch screen as host (master), single chip microcomputer as Slave (slaver). Hmimaker touch screen itself support Modb
I am ashamed to say that I have been engaged in many things in school for a long time, but I did not seriously do the basic things of 51 single chip microcomputer. I had just learned 51 for more than a week, I switched to the 16-bit single-chip microcomputer of Apsara stack, so that 51 has not been thoroughly understood.
It would be better for me to know exactly
Surrounding environment:System environment: Win7 64 positionSoftware platform: Multisim 12.0Objective:Just graduated, but the mode of knowledge also forgot almost the same, coupled with their own want to engage in hardware design. Let's say it's just a reading book. Do not practice, or eventually feel shallow. As an interest to learn the mode of electrical, simulation simulation.Multisim MCU less, take 51来 practice practiced hand. Build
51 Pre-festival promotional campaign launched short message marketing efficient strategic attackAs 51 approaches, each year the holiday is a golden time for businesses to carry out various business activities, and this year's 51 is unusual for many businesses: this year's Shanghai World Expo will be opened on May 1, and the world's eyes will focus on China. In on
() {public void Handlemessage (Message msg) {Super.handlemessage (msg);Buttonstart.setenabled (TRUE);Buttonstop.setenabled (FALSE);Switch (MSG.ARG1) {Case ACTIVITY.RESULT_OK:Toast.maketext (Servicetest1.this, "Result:ok", Toast.length_long). Show ();BreakCase activity.result_canceled:Toast.maketext (Servicetest1.this, "Result:cancel", Toast.length_long). Show ();BreakDefaultBreak}}};}The service-side code is as follows://Avoid naming duplicates, add the namespace of the class to the frontpublic
reached their final position.For the last 2,2! =5,2 = = A[2], so found duplicatesFrom the above example, it can be found that each element can reach the final position at most 2 times , time complexity O (n), Space complexity O (1)#include using namespace STD;voidSwapinta,intAMP;B) {inttemp = A; A = B; B = temp;}BOOLDuplicateintA[],intSizeint*duplication) {//Check input legitimacy if(A = = NULL | | size 1)return false; for(inti =0; i if(A[i] 0|| A[i] > size-1)return false; }//Find phase
51. 52 single-chip microcomputer matrix keyboard, 5152 single-chip microcomputer Matrix
To learn about the matrix keyboard, first make a small experiment: After you press the matrix keyboard, the digital display displays the number of keys that are pressed.
My matrix keyboard is 4x4. The operating principle is to first check which line of key is pressed. Then determine the column. In this way, you can identify which key is pressed.
First, let's look a
STC12C5A60S2 51 microcontroller minimum system,STC12C5A60S2
1. Connect the physical circuit according to the chip documents. Minimum system:Circuit Diagram
2. Install the driver according to the usb downloader1. first, plug the usb downloader into the computer, View computer device management, view the occupied com port if the device is not identified, you need to install the usb driver 2. install the keil compiler 1>. create a new project, create a
Today, I was reading the news and found that a company has a new product, claiming that it can "directly connect to the debit card online banking to parse bills, breaking through the restrictions that can only resolve credit card bills ", every time I see a new product, I think security is the top priority! Conclusion: It is really unreliable to store financial-related information on the Internet! Today at 36kr to see the news, found 51 credit card ou
).
Distance from L = (T * 12/(x * 10 ^ 6) * 340000/2 (mm)
= 0.17 * t (x = 12)
= (2.04/11.0592) * t (x = 11.0592)
V. Code Analysis
1. initialize the program and set a timer to calculate the echo high time.
Tmod = 0x01; // set t0 as Mode 1; th0 = 0; tl0 = 0; tr0 = 1; et0 = 1; // allows t0 to interrupt Ea = 1; // enable the total interrupt TR = 0;
2. Send more than 10 US high to trig
Tr = 1; _nop_(); _nop_(); _nop_(); _nop_(); _nop_(); _nop_(); _nop_(); _nop_(
Label: Preliminary refresh Theorem1284. reference time limit of 2 3 5 7: 1 second space limit: 65536 kb score: 5 gives a number N, evaluate 1 to n, the number is not a multiple of 2, 3, 5, and 7. For example, if n = 10, only 1 is not a multiple of 2, 3, 5, and 7. Input
Enter 1 N (1 Output
The total number of outputs is not a multiple of 2, 3, 5, and 7.Input Example 10 output Example 1 because N is very large, direct enumeration is not feasible, but the solution can be quickly obtained by using t
the following two C statements? const char *p; char* const p;
Description:Const char * P:The value pointed to by P is read-only;Char * const P:The value of P is read-only;
54th questions
What is the difference between memcpy and memmove?
Description:The processing of overlapping regions is different.
55th questions
What is the format specifiers for printf to print double and float values?
Description:Double: % lfFloat: % F
56th questions
Write a small C program to determine whether a machine
is evident in the n-queue question. Thinking of solving problems by backtracking(1) To define the solution space for the problem;(2) Determine the spatial structure of the solution that is easy to search;(3) Searching the solution space in depth first, and using pruning function to avoid invalid search during the searching process.Backtracking is to let the computer automatically to search, meet the situation to end or save, in a path to the end can not find the solution, go back to the origina
This typical C language 100 question is found online. This is also available in programming enthusiast forums.
Note: I may have skipped some questions, but I have not done anything about the graphics. There are still a few questions that are not a question at all, so they are not done either.
Some questions appear twice because two different answers are written!
/* [Program 51 ~ 60] Question: learning to use bitwise AND , bitwise OR operations |, bit
= counter + 1
Next
3. Use the description object
You can use the description object to return the properties set object that contains a group of property objects. The property object consists of the property name and value. Then, you can specify in the statement to replace the object name with the returned properties set. (Each property object contains a property name and value ).
To create a properties set, enter the description. Create statement using the following syntax:
SetMydescription= D
The road to life is not long. the narrow streets come and go. But when I came, I never met again, so you let me wait alone, watching in the foreseeable future, almost solidified into the eternal history.51 TV stations use the most frequently-used classic background music
1. The Magnificent Seven)Everyone on Earth knows the favorite background music for large awards parties. Bernstan composing.
Address http://www.aebc.com /~ Shtuet/m7.mp3
2. Original s
Original article: http://www.noupe.com/tutorial/51-best-of-jquery-tutorials-and-examples.html
There's stuff all over the web about jquery, but finding the best tutorials to get you started can be tough. Here are examples and tutorials from jquery masters to keep you on the right track.
We will start with jquery masters and feature some of their best tutorials, then we will move on to more categorized tutorials, cheat sheets and hacks.
You can als
I. Introduction
Infrared transmitter module: Power Supply 3.3v or 5 V. It emits a 38 kHz infrared signal through the Transmitting Tube and is driven at a high level.
Infrared receiving module: the power supply is 3.3v or 5 V. It can receive infrared signals and demodulated them into a logic level. The low level is effective.
Ii. Circuit Diagram
Infrared Emission circuit diagram
Infrared circuit diagram
Iii. Code of the infrared emission module
# Include Key = 1 ;}/// -----------------------
Tip 51. How to load EF metadata in any form of stream
In tip 45, I showed how to generate a connection string at runtime, which is pretty nice.
The problem is that it relies on metadata files (. csdl. ssdl. msl) stored on local disks.
But what if these files are stored on the web server or in similar locations, and you even have no permission to access the local file system and cannot copy them to the local machine?
You can also load the metadata in t
[ThinkingInJava] 51. Hash and hash code, thinkinginjava51
/*** Book: Thinking In Java * function: hash and hash code * file: Groundhog. java * Time: May 3, 2015 09:42:54 * Author: cutter_point */package Lesson17Containers; public class Groundhog {protected int number; // protection type. After inheritance, the protection type is still public Groundhog (int n) {number = n ;}public String toString () {return "Groundhog #" + number ;}}
/*** Book: Think
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.