This program demonstrates how to draw lines in a picture box using the GDI, controlling background color and line color. It also includes a simple animation using a Timer.
1. This BSP can support 2443EVT0 board.
If you want to use EVT0 BSP, set followings.
In smdk2443\smdk2443.bat file
set BSP_EVT1=1
-> set BSP_EVT1=
In smdk2443\src\inc\bsp_cfg.h file
#define EVT1
-> #define EVT0
2. Default system tick mode is changed. The value is fixed tick.
Fixed tick means that tick interrupt is occurred every 1ms.
Variable tick means that Timer interrupt period is changed when power mode is in idle.
For changing to variable tick
In smdk2443\src\inc\bsp_cfg.h file
#define FIXEDTICK
-> #define VARTICK
In smdk2443\src\Common\Timer\Sources file
SOURCES= Timer_fixedtick.c watchdog.c
->
SOURCES= Timer_vartick.c watchdog.c
I was trying to develope a programme to make a slide show of all the pictures of a folder using vb.net. I have spent lot of time in net for searching this but all in vain, I didn t get a simple programme to solve the same and lastly I gave myself a try for the same and developed the code, I have used there a folderbrowserdialogue and a Timer with a picture box control and in coding I have used IO name spaces to get the pathe and folder info here is the code.
Enjoy
Subhankar
The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for
firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The
W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the
contents of the 32KB main ROM to be updated by the loader program located at the 4KB auxiliary
ROM 512 bytes of on-chip RAM four 8-bit bi-directional and bit-addressable I/O ports an additional 4-
bit port P4 three 16-bit Timer/counters a serial port. These peripherals are supported by a eight
sources two-level interrupt capability. To facilitate programming and verification, the ROM inside the
W78E58B allows the program memory to be programmed and read electronically. Once the code is
confirmed, the user can protect the code for security