1. The document discusses the 8086 microprocessor, which is a 16-bit processor that can address up to 1MB of memory using its 20-bit address bus. It has 16-bit registers and can perform 16-bit operations on data in memory.
2. The 8086 can read or write 16-bit words from memory in a single operation if the first byte is stored at an even address, but requires two operations if stored at an odd address. It can also perform 8-bit reads and writes to memory or I/O ports.
3. Data transfer between the CPU and memory involves using registers like AX to read or write bytes and words from memory addresses. Data transfer to I
Program is a set of instructions written to solve a problem. Instructions are the directions which a microprocessor follows to execute a task or part of a task. Broadly, computer language can be divided into two parts as high-level language and low level language. Low level language are machine specific. Low level language can be further divided into machine language and assembly language.
Machine language is the only language which a machine can understand. Instructions in this language are written in binary bits as a specific bit pattern. The computer interprets this bit pattern as an instruction to perform a particular task. The entire program is a sequence of binary numbers. This is a machine-friendly language but not user friendly. Debugging is another problem associated with machine language.
To overcome these problems, programmers develop another way in which instructions are written in English alphabets. This new language is known as Assembly language. The instructions in this language are termed mnemonics. As microprocessor can only understand the machine language so mnemonics are translated into machine language either manually or by a program known as assembler.
Efficient software development for the microprocessor requires a complete familiarity with the instruction set, their format and addressing modes. Here in this chapter, we will focus on the addressing modes and instructions formats of microprocessor 8086.Program is a set of instructions written to solve a problem. Instructions are the directions which a microprocessor follows to execute a task or part of a task. Broadly, computer language can be divided into two parts as high-level language and low level language. Low level language are machine specific. Low level language can be further divided into machine language and assembly language.
Machine language is the only language which a machine can understand. Instructions in this language are written in binary bits as a specific bit pattern. The computer interprets this bit pattern as an instruction to perform a particular task. The entire program is a sequence of binary numbers. This is a machine-friendly language but not user friendly. Debugging is another problem associated with machine language.
To overcome these problems, programmers develop another way in which instructions are written in English alphabets. This new language is known as Assembly language. The instructions in this language are termed mnemonics. As microprocessor can only understand the machine language so mnemonics are translated into machine language either manually or by a program known as assembler.
Efficient software development for the microprocessor requires a complete familiarity with the instruction set, their format and addressing modes. Here in this chapter, we will focus on the addressing modes and instructions formats of microprocessor 8086.
Program is a set of instructions written to solve a problem. Instructions.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Normal Labour/ Stages of Labour/ Mechanism of Labour
8086 microprocessor
1. CSE 307 - Microprocessor
Mohd. Moinul Hoque, Lecturer, Dept of CSE , AUST
16Bit Microprocessor : 8086
Features of 8086
- 8086 is a 16bit processor. It’s ALU, internal registers works with 16bit binary
word
- 8086 has a 16bit data bus. It can read or write data to a memory/port either 16bits
or 8 bit at a time
- 8086 has a 20bit address bus which means, it can address upto 220
= 1MB memory
location
- Frequency range of 8086 is 6-10 MHz
Data Read/Write process from /To Memory
Word Read
- Each of 1 MB memory address of 8086 represents a byte wide location
- 16bit words will be stored in two consecutive Memory location
- If first byte of the data is stored at an even address , 8086 can read the entire
word in one operation.
o For example if the 16 bit data is stored at even address 00520H is 2607
MOV BX, [00520]
8086 reads the first byte and stores the data in BL and reads the 2nd
byte
and stores the data in BH
BL (00520)
BH (00521)
- If the first byte of the data is stored at an ODD address, 8086 needs two operation
to read the 16 bit data
o For example if the 16 bit data is stored at even address 00521H is F520
MOV BX, [00521]
In first operation , 8086 reads the 16 bit data from the 00520 location and
stores the data of 00521 location in register BL and discards the data of
00520 location
2. CSE 307 - Microprocessor
Mohd. Moinul Hoque, Lecturer, Dept of CSE , AUST
In 2nd
operation, 8086 reads the 16 bit data from the 00522 location and
stores the data of 00522 location in register BH and discards the data of
00523 location
BL (00521)
BH (00522)
Byte Read:
MOV BH, [Addr]
For Even Address:
Ex: MOV BH, [ 00520]
8086 reads the first byte from 00520 location and stores the data in BH and reads
the 2nd
byte from the 00521 location and ignores it
BH [ 00520]
For Odd Address
MOV BH, [Addr]
Ex: MOV BH, [ 00521]
8086 reads the first byte from 00520 location and ignores it and reads the 2nd
byte
from the 00521 location and stores the data in BH
BH [ 00521]
3. CSE 307 - Microprocessor
Mohd. Moinul Hoque, Lecturer, Dept of CSE , AUST
Registers of 8086
4. CSE 307 - Microprocessor
Mohd. Moinul Hoque, Lecturer, Dept of CSE , AUST
Important 8086 Pin Diagram/Description
AD15±AD0
ADDRESS DATA BUS: These lines constitute the time multiplexed
memory/IO address and data bus.
ALE
Address Latch Enable. A HIGH on this line causes the lower order 16bit address bus to be
latched that stores the addresses and then, the lower order 16bit of the address bus can be used
as data bus.
READY
READY is the acknowledgement from the addressed memory or I/O device that it will complete
the data transfer.
INTR
INTERRUPT REQUEST: is a level triggered input which is sampled during the last clock cycle of
each instruction to determine if the processor should enter into an interrupt acknowledge
operation. A subroutine is vectored to via an interrupt vector lookup table located in system
memory. It can be internally masked by software resetting the interrupt enable bit. INTR is
internally synchronized. This signal is active HIGH.
INTA
Interrupt Acknowledge from the MP
5. CSE 307 - Microprocessor
Mohd. Moinul Hoque, Lecturer, Dept of CSE , AUST
NMI
NON-MASKABLE INTERRUPT: an edge triggered input which causes
an interrupt request to the MP. A subroutine is vectored to via an interrupt vector
lookup table located in system memory. NMI is not maskable internally
by software.
RESET: causes the processor to immediately terminate its present
activity. The signal must be active HIGH for at least four clock cycles. It
restarts execution
MN/MX
MINIMUM/MAXIMUM: indicates what mode the processor is to operate in. The two modes are
discussed in the following sections.
M/IO : Differentiate between the Memory and I/O operation. A LOW on this pin indicated I/O
operation and a HIGH indicated a Memory Operation
HOLD : The 8086 has a pin called HOLD. This pin is used by external devices to gain control of
the busses.
HLDA :
When the HOLD signal is activated by an external device, the 8086 stops executing instructions
and stops using the busses. This would allow external devices to control the information on the
8086 MINIMUM AND MAXIMUM MODES of operation
MN/MX
• Minimum mode The 8086 processor works in a single processor environment.
All control signals for memory and I/O are generated by the microprocessor.
• Maximum mode is designed to be used when a coprocessor exists in the system.
• 8086 works in a multiprocessor environment. Control signals for memory and
I/O are generated by an external BUS Controller.
6. CSE 307 - Microprocessor
Mohd. Moinul Hoque, Lecturer, Dept of CSE , AUST
Data Transfer Between CPU and the Memory
Memory Write:
Byte Transfer: move BYTEPTR ds : [SI], 37H
Word Transfer: move WORDPTR ds : [SI], 1237H
Memory Read:
Byte Transfer: move al, BYTEPTR ds : [SI]
Transfers data from the physical memory address calculated using ds and [SI] to register
AL ( Lower byte of AX Register)
Word Transfer: move ax, WORDPTR ds : [SI]
Transfers data from the physical memory address calculated using ds and [SI] to register
AL ( Lower byte of AX Register) and the next byte from the next memory location
calculated as ds:[SI +1] is transferred to AH ( Higher byte of AX Register)
Memory operation through ax Register
Write:
MOV AX , 1234H
MOV WORDPTR ds: [SI], ax
Ds: 0000H
SI: 0500H
Physical Address: 00000+0500= 00500 H
The instruction transfers
34 00500H
12 00501H
Read:
MOV ax, WORDPTR ds: [SI]
Ds: 0000H
SI: 0500H
Physical Address: 00000+0500= 00500 H
7. CSE 307 - Microprocessor
Mohd. Moinul Hoque, Lecturer, Dept of CSE , AUST
The instruction transfers
AL (00500)
AH (00501)
Data Transfer Between CPU and the Port
Port addresses in 8086 are assigned either 8bit port address or 16 bit address
For a Port with 8bit port address:
Read Operation:
IN Padr where Padr is the 8bit Port address
Ex: IN 20H
The instruction transfers data byte from the 8bit port address 20H to register AL
Write Operation:
OUT Padr where Padr is the 8bit Port address
Ex: OUT 20H
The instruction transfers data byte from AL to the 8bit port address 20H .
For a Port with 16bit port address:
DX register is used to hold the Port address
Read Operation:
Example:
Mov DX, 4000H
IN al, DX
The instruction transfers data byte from 16bit port address 4000H contained in
DX register to AL.
8. CSE 307 - Microprocessor
Mohd. Moinul Hoque, Lecturer, Dept of CSE , AUST
Write Operation:
Example:
MOV AL, 10H
MOV DX, 4000H
OUT DX, al
The instruction transfers data byte 10H from register AL to 16bit port address
4000H contained in DX