STM32F103 realizes temperature and humidity (AHT20) collection through IIC protocol

STM32F103 realizes temperature and humidity (AHT20) collection through IIC protocol Article directory STM32F103 realizes temperature and humidity (AHT20) collection through IIC protocol 1. IIC Agreement 1. Introduction to IIC protocol 2. Physical layer and protocol layer 3. Software IIC and hardware IIC 2. Temperature and humidity collection 1. IIC protocol 1. Introduction to IIC protocol […]

STM32 development practice-data collection of AHT20 temperature and humidity sensor based on I2C protocol

STM32 development practice-data collection of AHT20 temperature and humidity sensor based on I2C protocol Preface “Software I2C” and “Hardware I2C” SoftwareI2C HardwareI2C AHT20 temperature and humidity sensor AHT20 main features AHT20 parameters Application areas STM32 data collection of AHT20 temperature and humidity sensor based on I2C protocol Ideas code Experimental effect Summarize Foreword In the […]

Stream stream + immutable collection

Immutable collection Create an immutable collection: data cannot be modified and defensively copied to the immutable collection; safe when called by an untrusted library. There are static methods of in the List Set Map interface->Get an immutable collection–>Cannot add, delete, modify (read-only) List<String> list = List.of(“”,””,””); //remove add set xxx is not allowed Set<String> set […]

Java data structure (red-black tree) set collection HashSet HashSet three problems LinkedHashSetTreeSet TreeSet collection default rules sorting rules

Directory Data structure (red-black tree) red and black rules Red-black tree adding node rules set set summary HashSet Three problems with HashSet LinkedHashSet summary TreeSet TreeSet collection default rules Sorting rules (first sorting method) Method 2 practise Xiaolian Summarize Summary: How to choose when using collections Data structure (red-black tree) Red and black rules The […]

Collection framework: characteristics of Set collection, underlying principles of HashSet collection, hash table, implementation of deduplication

Characteristics of Set collection Set is an unordered, non-repeating data structure. Its characteristics are as follows: 1. The elements in the set are unordered: The elements in the Set have no order and cannot be accessed through indexes. 2. The elements in the set are unique: Duplicate elements are not allowed in the Set, and […]

final finally finalize difference stream stream Stream method mvc aop ioc understanding the difference between Collection and Collections Nacos AP, CP

Method to create thread 1. The class inherits Thread and overrides the run() method 2. The class implements the Runnable interface and overrides the run() method (no return value, no exception will be thrown) 3. Implement the Callable interface and implement the call() method (with a return value and an exception will be thrown) To […]

Data collection of AHT20 temperature and humidity sensor based on I2C protocol

Data collection of AHT20 temperature and humidity sensor based on I2C protocol 1. Basic introduction 1. What is “software I2C” and “hardware I2C” 2.AHT20 temperature and humidity sensor 2. Project establishment 3. Code part 4. Results display and summary 1. Basic introduction 1. What is “software I2C” and “hardware I2C” Software and protocol layers, hardware […]

Collection collection-List collection

Article directory Preface 1. Commonly used methods of Collection 1. add() method 2. addAll() method 3. contains(Object o) and containsAll(Collection c) 4. remove() and removeAll() 5. retainAll() takes the intersection value 6. Other methods Note: Collection does not have a get() method. 2. List interface 1.ArrayList 1.1 Advantages and Disadvantages of ArrayList 1.2 ArrayList implements […]

The most complete and detailed Java project deployment guide on the Internet (recommended collection)

Directory 1. Server requirements 1. Server specifications 1.1 Server configuration 1.2 Server selection From the perspective of server purchase cost From the perspective of data security From the perspective of post-service From the perspective of ease of use of the software 2. Network 2.1 Network selection 2.2 Network bandwidth 3. Graphical tools 2. System deployment […]