Why pic18f452 was used in the project designed, Computer Engineering

Assignment Help:

I have used the PIC18F452 microcontroller for both the main micro and the interface chip device because of it enhanced features that can be used to meet the specification required from the project designed such as large Memory, I2C bus, sufficient Input and Output pins for interface devices, In-Circuit Debug (ICD) via two pins and others explained in the table below.

The device PIC18F452 family incorporates a range of features that can significantly reduce power consumption during operation.

Table: Features description of microcontrollers

PIC microcontroller
Feature

PIC  microcontroller
feature description

Flash memory

Re-programmable program storage.

RAM

Memory storage for variables.

EEPROM

Long term stable memory: Electrically Erasable Programmable Read Only Memory.

I/O ports

High current Input/output ports (with pin direction change).

Timers/Counters

Typically 3.

USART

Built in RS232 protocol (only needs level translator chip).

CCP

Capture/Compare/PWM module.

SSP

I2C and SPI Interfaces.

Comparator

An analogue comparator and internal voltage reference.

ADC

Analogue to digital converter.

LCD

LCD interface.

ICSP

Simple programming using In Circuit Serial Programming.


Related Discussions:- Why pic18f452 was used in the project designed

Show the hypothetical instruction format of 32 bits, Q. Show the Hypothetic...

Q. Show the Hypothetical Instruction Format of 32 bits? A sample instruction format is shown in figure below. Figure: A Hypothetical Instruction Format of 32 bits

What are assets in adobe premiere pro, Question: a) What is the meanin...

Question: a) What is the meaning of the term CTI in Adobe Premiere Pro? b) What are assets in Adobe Premiere Pro? c) In Adobe Premiere Pro, what is the principal diffe

Mobility management in mobile systems, Instruction 1. You can do this i...

Instruction 1. You can do this individually or in groups of 2-3 students. 2. Any material copied and pasted from anywhere (e.g., figures and text) is considered plagiarism even

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

Interpolation algorithm, Design two matlab algorithms for enlarging the 256...

Design two matlab algorithms for enlarging the 256x256 images into 512x512 images by using bilinear and bicubic interpolations   a)  Evaluate the interpolated images with the

Explain about double error detection bit, Q. Explain about Double Error Det...

Q. Explain about Double Error Detection bit? Let's presume now that two bit errors take place in data. Data received: So on -matching we conclude P3-D3 pair doesn't

Line of code of assembly language, In how many ways line of code of assembl...

In how many ways line of code of assembly language can be divided? A line of code of an assembly language program can be divided in three columns called as fields. The fields d

Explain the criteria to classify data structures, Explain the criteria to c...

Explain the criteria to classify data structures used for language processors? The data structures utilized in language processing can be classified upon the basis of the subse

Simplify following using k-map, Q. Explain XNOR gate with three input varia...

Q. Explain XNOR gate with three input variable and draw necessary circuits. Q. Simplify FOLLOWING Using K-Map 1. m0 + m1 + m6 + m7 + m12 + m13 + m8 + m9 2. m0 + m2 + m4 +

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd