Keypads operation, Computer Engineering

The 16 keys (4x4 matrixes) keypads diagram is shown in figure 4 above. Let see how the keypad is connected. Each square of the alphanumeric has to be pushed to make a switch or connection, which connects the horizontal wires (Rows) with the vertical wires (Columns). For example, if button ‘A' is pressed, it will connect COL1 with ROW4, or pressing button '5' will connect COL2 with ROW2.

The keypads are usually organized in a matrix of rows and columns. The microcontroller will access both the rows and columns through the ports. If a key pressed, a row and column make a contact; otherwise there will be no connection between rows and columns.

Since the switches or keys are all interconnected, I need differentiate between the each one of them. I have connected four 10K Ohms resistors each on the interface board to pull lines (COL1- COL 4) high (set as input) and connected them PORTA (RA1-RA4) on the microcontroller. These four lines are been read in the program. So if no key is pressed, these lines will all read high. The other four pins (ROW-ROW4) are connected to pins on PORTB (RB0-RB3) the PIC18F452 and set as output. The full schematic diagram for this section could be found in the appendix.

To interface the keypad, two main processes listed below must occur:

I. Key press detection
II. Key identification
Moreover, there are two ways of performing key press detection:

1) The interrupt method (Port B - Change interrupt can be used)
2) Scanning method

Posted Date: 2/23/2013 12:40:37 AM | Location : United States







Related Discussions:- Keypads operation, Assignment Help, Ask Question on Keypads operation, Get Answer, Expert's Help, Keypads operation Discussions

Write discussion on Keypads operation
Your posts are moderated
Related Questions
Consider the following pseudo-code segment. 1.  input y {y is a three-digit hexadecimal number} 2.  d ← 0 3. for i = 1 to 3      3.1. char ← i th character from y readin

What are the advantages of open source system? High-quality software Lesser hardware costs Integrated management No vendor lock-in Take control of our softwa

Example Application: There are many fantastic applications of genetic algorithms. Conceivably my favorite is their usage in evaluating Jazz melodies done as part of a PhD proj

write er diagram for company database

Your shell must accept the exit command. This command will be in the form: e x i t When you encounter this command, your shell should terminate. Please note that when you

Q. Describe about Instruction set? Instruction set is the boundary where computer designer and computer programmer see the same computer from various viewpoints. From the desig

What are the Steps include constructing a Functional Model Recognize input and output values Build data flow diagrams which shows functional dependencies Explain

Q. What is Rambus DRAM? RDRAM which was developed by Rambus has been adopted by Intel for its Pentium and Itanium processors. It has become main competitor to SDRAM. RDRAM chip

Multiple Layers of Intranet Security Security requirements vary from organisation to organisation. They also vary on the content that the organisations intend to place on their

Q. Illustrate Domain Name System? Domain name is a name which is given to a network for ease of reference. Domain refers to a group of computers which are known by a single com