Interrupt and scanning method of keypad operation, Computer Engineering

Assignment Help:

INTERRUPT METHOD - USING PORTB CHANGE INTERRUPT

By using 4 by 4 matrix keypad connected to PORTA and PORTB. The rows are connected to PORTA-Low (RA1-RA4) and the columns are connected to PORTB-High (RB4-RB7),

which is the PORTB-Change interrupt. The matrix keypad connection operation is explained in the following stages:

1 When the preceding key is released, Zero's will be the output to all rows at once and columns would be read and checked often until the column becomes high. If high, the program waits for a short period of time and then it returns next stage, i.e. waiting for a key to be pressed.
2 To ensure that a key is pressed, the columns are connected to the PORTB-Change interrupt. Hence, if a key pressed, this will cause an interrupt and microcontroller to execute the ISR. The main duty of the ISR is to ensure that the first key press was not erroneous as a result of noise as well as waiting for 20ms to prevent the key press from being interrupted as multiple key presses.
3 Detecting which row the key pressed belongs to, the microcontroller grounds one row at a time and then read the column each time. If all columns are detected HIGH, then the key press cannot belong to that row: hence it grounds the next row and continues until it finds the row the key press belongs.
4 To recognize the key press, the microcontroller rotates the column bits, i.e. a bit at a time, into the carrying flag and check to see if it is set LOW.

SCANNING METHOD

This is done by switching only one ROW at a time to be low. For example, If I set ROW1 low we can then read just the top row of buttons, button 1 will take COL1 low, button2 will take COL2 low, and the same for buttons '3' and 'F' in COL 3 and COL 4.

Hence, the other 12 lower buttons would not have any effect because their respective ROW lines are still high. So to read the other keys we need to take their respective ROW lines low, i.e. taking ROW2 low will allow us to read the second row of buttons (4, 5, 6, and E) again as the other three ROW lines are now high, the other 12 buttons have no effect.

We can then repeat this for the last two Row's using ROW3 and ROW4, so we read four buttons at a time, taking a total of four readings to read the entire keypad. This is a common technique for reading keyboards, and is known as 'Keyboard Scanning'.

However, one obvious problem that may occur is that "What will happens if more than one key is pressed at a time?", there are a number of ways to deal with this, although I might not include this stage in my code, but if time permit me I will try to do so. The methods are as follows:
1) To check for multiple key presses and ignore them,
2) To accept the first key, then find which is pressed. This way is simpler.
Various commercial products deal with this situation in similar ways, some reject multiple key presses, and some just accept the first one.

Firstly, check to see if any of the 12 keys are pressed (by making all the ROW lines low) and waiting until no keys are pressed; this will avoid problems with key presses repeating.

If no keys are pressed or detected, it jumps to the routine Keys which repeatedly scans the keyboard until a key is pressed, and the call for a delay.

Once a key has been pressed the result is returned in the variable e.g. 'key', and then logically AND with 0x0F to be entirely sure it's between 0 and 15. Then the next this value is passed to a look-up table or Key mapped matrix i.e. [COL] [ROW] which translates the key to its required value (in this case the ASCII value of the labels on the keys).

Finally, the ASCII value is stored back in the 'key' variable (just in case you might need it storing) and the routine returns with the ASCII value in the working (W) register.


Related Discussions:- Interrupt and scanning method of keypad operation

Sequence of micro -operations to perform a specific function, Q. Sequence o...

Q. Sequence of micro -operations to perform a specific function? A digital system executes a sequence of micro-operations on data stored in registers or memory. Specific sequen

Explain the modularity of object oriented analysis, Explain the Modularity ...

Explain the Modularity of Object oriented analysis Modularity is closely attached to encapsulation; you may think of it as a way of mapping encapsulated abstractions into phys

Advantages and disadvantages of public-key cryptography, Advantages and Dis...

Advantages and Disadvantages of Public-key cryptography Advantages (i) Enhanced security and convenience  (ii) Electronic records may be authenticated by affixing

What is the difference between a latch and a flip-flop, What is a flip-flop...

What is a flip-flop? What is the difference between a latch and a flip-flop? List out the application of flip-flop. Ans. Flip-Flop: It is a fundamental memory element utilize

Use of delay loops, A very useful application of assembly is to generate de...

A very useful application of assembly is to generate delay loops. These loops are used for waiting for some time before execution of subsequent instruction. However how to find

What are the different methods of passing data, What are the different meth...

What are the different methods of passing data? There are three different methods of passing data Calling by reference    Calling by value Calling by value and result

Chains of inference, Chains of Inference: Now we have to look at how t...

Chains of Inference: Now we have to look at how to get an agent to prove a given theorem using various search strategies? Thus we have noted in previous lectures that, there i

Define file record length, Define File record length ? File record leng...

Define File record length ? File record length must be selected to match the data characteristics.

# real life business subsystem, Is production, marketing, personal, materia...

Is production, marketing, personal, material, finance are the real life business subsystems? if yes, then how?

Explain rudimentary file formats, Q. Explain rudimentary file formats? ...

Q. Explain rudimentary file formats? FTP only understands two rudimentary file formats. It classifies every file either as a text file or a binary file. A text file comprise a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd