search
HomeTechnology peripheralsIt IndustryJikrypton's upcoming second MPV model 'CM2E” has been exposed in spy photos and may be officially released in the first half of 2024

According to news on January 17, the famous car blogger @SugarDesign posted a spy photo on social media, showing the second MPV model of the Jikrypton brand, code-named "CM2E". Judging from the photos, this new car is speculated to be a small MPV and is expected to be officially released in the first half of 2024.

Jikryptons upcoming second MPV model CM2E” has been exposed in spy photos and may be officially released in the first half of 2024

It can be observed from the exposed spy photos that the roof line of Jikrypton CM2E is very straight, giving people a sense of stability and grandeur. In addition, the new car also adopts a hidden door handle design and a novel method of fixing the rearview mirror on the door. At the rear of the car, Jikrypton CM2E presents a full and round shape, and is equipped with a through-type taillight design, which is similar to Jikrypton 007, showing the continuity of the brand design.

Jikryptons upcoming second MPV model CM2E” has been exposed in spy photos and may be officially released in the first half of 2024

According to this spy photo, Jikrypton CM2E does not adopt the side sliding door design on previous concept cars, but chooses the more common swing door method. However, some analysts believe that this does not mean that future mass-produced models will completely abandon the sliding door design. It is possible that entry-level models will have swing doors, while high-end models will offer side-sliding doors.

Jikryptons upcoming second MPV model CM2E” has been exposed in spy photos and may be officially released in the first half of 2024

In addition, according to previously leaked patent images, Jikrypton CM2E may have innovations in the way of opening doors. According to reports, the front door may support two-stage opening. The first stage has an opening angle of 80 degrees, and the second stage can reach 160 degrees. Such a design will undoubtedly greatly improve the flexibility and convenience of opening the car door. At the same time, the patent drawing also shows that the new car can directly open the rear door without opening the front door. This unique design undoubtedly increases the practicality of the vehicle. These innovative door opening methods provide passengers with a more convenient entry and exit experience and enhance the practical value of the vehicle.

As for the power information, Ji Krypton has not released any specific data yet. However, we can refer to the power parameters of the Ji Krypton 007 of the same brand: it uses an 800V architecture and a silicon carbide rear motor. The power of the single motor version reaches 310 kilowatts, and the total power of the dual motor version is as high as 475 kilowatts. Based on this information, we have reason to expect that Jikrypton CM2E will not disappoint us in terms of power performance.

The above is the detailed content of Jikrypton's upcoming second MPV model 'CM2E” has been exposed in spy photos and may be officially released in the first half of 2024. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:ITBear科技资讯. If there is any infringement, please contact admin@php.cn delete
Benefits of Custom Telecommunication SoftwareBenefits of Custom Telecommunication SoftwareMay 11, 2025 am 08:28 AM

Customized telecom software development is undoubtedly a considerable investment. However, in the long run, you may realize that such a project may be more cost-effective because it can increase your productivity like any ready-made solution on the market. Understand the most important advantages of building a customized telecommunications system. Get the exact features you need There are two potential problems with the off-the-shelf telecom software you can buy. Some lack useful features that can significantly improve your productivity. Sometimes you can enhance them with some external integration, but that isn't always enough to make them great. Other software has too many functions and is too complicated to use. You probably won't use some of these (never!). A large number of features usually adds to the price. Based on your needs

CNCF Triggers a Platform Parity Breakthrough for Arm64 and x86CNCF Triggers a Platform Parity Breakthrough for Arm64 and x86May 11, 2025 am 08:27 AM

CI/CD puzzles and solutions for open source software in Arm64 architecture Deploying open source software on Arm64 architecture requires a powerful CI/CD environment. However, there is a difference between the support levels of Arm64 and traditional x86 processor architectures, which are often at a disadvantage. Infrastructure components developers for multiple architectures have certain expectations for their work environment: Consistency: The tools and methods used across platforms are consistent, avoiding the need to change the development process due to the adoption of less popular platforms. Performance: The platform and support mechanism have good performance to ensure that deployment scenarios are not affected by insufficient speed when supporting multiple platforms. Test coverage: Efficiency, compliance and

Top 21 Developer Newsletters to Subscribe To in 2025Top 21 Developer Newsletters to Subscribe To in 2025Apr 24, 2025 am 08:28 AM

Stay informed about the latest tech trends with these top developer newsletters! This curated list offers something for everyone, from AI enthusiasts to seasoned backend and frontend developers. Choose your favorites and save time searching for rel

Serverless Image Processing Pipeline with AWS ECS and LambdaServerless Image Processing Pipeline with AWS ECS and LambdaApr 18, 2025 am 08:28 AM

This tutorial guides you through building a serverless image processing pipeline using AWS services. We'll create a Next.js frontend deployed on an ECS Fargate cluster, interacting with an API Gateway, Lambda functions, S3 buckets, and DynamoDB. Th

CNCF Arm64 Pilot: Impact and InsightsCNCF Arm64 Pilot: Impact and InsightsApr 15, 2025 am 08:27 AM

This pilot program, a collaboration between the CNCF (Cloud Native Computing Foundation), Ampere Computing, Equinix Metal, and Actuated, streamlines arm64 CI/CD for CNCF GitHub projects. The initiative addresses security concerns and performance lim

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools