This document discusses the design and implementation of WinARM, a simulator for the ARM processor written in C. WinARM uses a fetch-decode-execute model to simulate the ARM architecture. It includes a Visual Basic GUI to allow users to observe the simulation. The goal of WinARM is to facilitate learning computer architecture through hands-on simulation of an ARM processor, without requiring actual hardware. Future work may include simulating additional ARM instruction types and incorporating instruction pipelining.
A 16-bit microprocessor I designed during my final semester (2005) of my Bachelor of Technology program. The microprocessor circuitry design was coded in VHDL and then configured in a Xilinx XC9572 PC84 CPLD kit. Most of the design, the architecture and the instruction set were taken from Computer System Architecture (3rd ed.) by M. Morris Mano. See https://github.com/susam/mano-cpu for VHDL source code and other related files.
Design & Simulation of RISC Processor using Hyper Pipelining TechniqueIOSR Journals
This Hyper pipelining technique is different to the pipelining of instruction decoding known from
RISC processors. The point is that we can use hyper pipelining on top of any sequential logic, for example a
RISC processor, independent of its underlying functionality. The RISC processor with pipelined instruction set
decoding can automatically be hyper pipelined to generate CMF individual RISC processors. Hyper pipelining
implements additional register and can use register balancing for fine grain timing optimizations. The method
hyper pipelining is also called “C-slow Retiming”. The main benefit is the multiplication of the core's
functionality by only implementing registers. This is a great advantage for ASICs but obviously very attractive
for FPGAs with their already existing registers
A 16-bit microprocessor I designed during my final semester (2005) of my Bachelor of Technology program. The microprocessor circuitry design was coded in VHDL and then configured in a Xilinx XC9572 PC84 CPLD kit. Most of the design, the architecture and the instruction set were taken from Computer System Architecture (3rd ed.) by M. Morris Mano. See https://github.com/susam/mano-cpu for VHDL source code and other related files.
Design & Simulation of RISC Processor using Hyper Pipelining TechniqueIOSR Journals
This Hyper pipelining technique is different to the pipelining of instruction decoding known from
RISC processors. The point is that we can use hyper pipelining on top of any sequential logic, for example a
RISC processor, independent of its underlying functionality. The RISC processor with pipelined instruction set
decoding can automatically be hyper pipelined to generate CMF individual RISC processors. Hyper pipelining
implements additional register and can use register balancing for fine grain timing optimizations. The method
hyper pipelining is also called “C-slow Retiming”. The main benefit is the multiplication of the core's
functionality by only implementing registers. This is a great advantage for ASICs but obviously very attractive
for FPGAs with their already existing registers
This is mainly intended for young faculty who are involved in ARM processor architecture teaching. This may also be useful to those who are keen in understanding the secrets of ARM architecture.Very good luck
An Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIMjournalBEEI
This paper deals with the novel design and implementation of asynchronous microprocessor by using HDL on Vivado tool wherein it has the capability of handling even I-Type, R-Type and Jump instructions with multiplier instruction packet. Moreover, it uses separate memory for instructions and data read-write that can be changed at any time. The complete design has been synthesized and simulated using Vivado. The complete design is targeted on Xilinx Virtex-7 FPGA. This paper more focuses on the use of Vivado Tool for advanced FPGA device. By using Vivado we get enhaced analysis result for better view of properly Route & Placed design.
Improving Code Compression Efficiency of MIPS32 Processor using Modified ISAIJMTST Journal
Embedded systems place major role in real world technology. In this memory and code size minimization
reduces the complexity of the system. Code compression techniques address this issue by reducing the
code size of application programs .Large code occupies more space in the Chip and also causes higher
power consumption because of increased memory traffic. In this paper, a modified architecture is proposed
for MIPS32 processor by replacing the Load-store Architecture with Register-store Architecture for some of
the instructions. Using Simple Scalar performance simulator we achieved 67.5% of compression efficiency
for MIPS32 processor with the help of modified ISA.
Smartphones architecture is generally different from
common desktop architectures. It is limited by power, size and
cost of manufacturing with the goal to provide the best
experience for users in a minimum cost. Stemming from this
fact, modern micro-processors are designed with an
architecture that has three main components: an application
processor that executes the end user’s applications, a modem
responding to baseband radio activities, and peripheral devices
for interacting with the end user.
Parallelism
Multicores:
The Cortex A7 MPCore processor implements the ARMv7-A
architecture. The Cortex A7 MPCore processor has one to
four processors in a single multi-processor device. The
following figure shows an example configuration with four
processors [3].
In this paper, we are discussing the architecture of the
application processor of Apple iPhone. Specifically, Apple
iPhone uses ARM Cortex generation of processors as their
core. The following sections discusses this architecture in terms
of Instruction Set Architecture, Memory Hierarchy and
Parallelism.
Realization of high performance run time loadable mips soft-core processoreSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Almaaqal University - Collage of Engineering-Department of Control and Computer Engineering Advanced Computer Architectures, CC408, 4th Year
Advanced Computer Architectures
1. Overview
Computer architecture is a fundamental concept in the field of computer science and engineering. It encompasses the design and structure of computer systems, focusing on how hardware components are organized and interconnected to execute instructions and process data efficiently.
1.1 SISD, MISD, SIMD, MIMD Architectures
Michael Flynn has introduced taxonomy for various computer architectures based on notions of Instruction Streams (IS) and Data Streams (DS). According to this taxonomy, the Computer Architectures could be classified into four categories; Single Instruction Single Data (SISD), Multiple Instruction Single Data (MISD), Single Instruction Multiple Data (SIMD), and Multiple Instruction Multiple Data (MIMD).
Figure 1.1: Flynn Taxonomy of Computer Architecture Let's explore each of them:
Prepared By: Assist. Prof. Dr. Mohammed Al-Ibadi
1
Almaaqal University - Collage of Engineering-Department of Control and Computer Engineering Advanced Computer Architectures, CC408, 4th Year
1. SISD (Single Instruction, Single Data):
SISD architecture is the most basic and traditional form of computing. In this model, a single central processing unit (CPU) executes one instruction at a time on a single piece of data. It's a sequential, linear approach where each instruction is processed one after the other. SISD is commonly found in older, uniprocessor systems.
2. SIMD (Single Instruction, Multiple Data):
In a SIMD architecture, a single instruction is applied simultaneously to multiple data elements. This is achieved through the use of multiple processing units or cores, and each unit processes a different data element simultaneously. SIMD is prevalent in graphics processing units (GPUs) and is well-suited for tasks requiring parallel processing, like image and video processing.
Prepared By: Assist. Prof. Dr. Mohammed Al-Ibadi
2
Almaaqal University - Collage of Engineering-Department of Control and Computer Engineering Advanced Computer Architectures, CC408, 4th Year
3. MISD (Multiple Instruction, Single Data):
MISD architecture is the least common among the four. It involves multiple processing units, each executing its own unique instruction on the same piece of data. This type of architecture has limited practical applications and is often used for experimental or specialized purposes, such as fault-tolerant systems.
4. MIMD (Multiple Instruction, Multiple Data):
MIMD architecture is the most versatile and widely used in modern computing. In MIMD systems, multiple processors or cores independently execute different instructions on separate data. This allows for true parallelism, making it suitable for a wide range of applications, including multi-threaded software, scientific simulations, and distributed computing.
Prepared By: Assist. Prof. Dr. Mohammed Al-I
A 64-Bit RISC Processor Design and Implementation Using VHDL Andrew Yoila
1. Introduction
In today technology digital hardware plays a very important role in field of electronic and computer engineering products today. Due
to fast growing and competition in the technological world and rapid rise of transistor demand and speediness of joined circuits and
steeps declines of the price cause by the improvement in micro-electronics application Machineries. The introduction of computer to
the society has affected so many things in the society in which almost all problems can be solve using computers. Many industries
today are requesting for system developers that have the skills and technical knowhow of designing the program logics. VHDL is one
of the most popular design applications used by designer to implement such task. Reduce instruction set computing (RISC) processor
play a vital role with RISC AND BIST features which most dominants patterns can provide, in systems testing of the circuits below
the tests which is important to the quality component of testing [1]. Although the Reduced instruction set have few instructions sets, as
its bit’s processing’s sizes increase then the test’s patterns become denser and the structure’s faults is kept great. In view to enable the
Operation of the most instructions as registers to registers operation, Arithmetic logic unit is studied and a detail test patterns is being
develop. This report is prepaid keeping in mind where specific application is automated and controlled. This report has 33 instruction
set with MICA architecture. This report will focus mainly on the meaning of
i. RISC processor,
ii. the design,
iii. the architecture,
iv. the data part and the instruction set of the design.
v. VHDL.
Design and implementation of complex floating point processor using fpgaVLSICS Design
This paper presents complete processor hardware with three arithmetic units. The first arithmetic unit can
perform 32-bit integer arithmetic operations. The second unit can perform arithmetic operations such as
addition, subtraction, multiplication, division, and square root on 32-bit floating point numbers. The third
unit can perform arithmetic operations such as addition, subtraction, multiplication on complex numbers.
The specific advancement in this processor is the new architecture introduced for complex arithmetic unit.
In general complex floating point arithmetic hardware consists of floating to fixed and fixed to floating
conversions. But using such hardware will lead to compromise between accuracy and number of bits used
to represent the fixed point equivalent of floating point numbers. The proposed architecture avoids that
compromise and it is implemented with less number of look-up tables to save around 5500 logic gates. The
complex numbers are represented using a subset of IEEE754 standard floating point format, 16-bits for
real part and 16-bits for imaginary part. The floating point arithmetic unit works on 32-bit IEEE754 single
precision numbers. The instruction set is specially designed to support integer, floating point and complex
floating point arithmetic operations. The on-chip RAM is 8kBytes and is extendable up to 64kBytes. As the
processor is designed to implement on FPGA, the embedded block RAMs are utilized as RAM.
With regards to this article, I agree and disagree on certain leve.docxalanfhall8953
With regards to this article, I agree and disagree on certain levels pertaining to racism in video games. I have been playing video games since the Nintendo days and I have noticed many stereotypes in video games that Evan has pointed out. Although Evan feels that all black characters are subject to stereotypes, there are bunches of game characters that I believe are not under this category and are in fact very ambitious characters. For example, Lee Everett from the Walking Dead: Season 1 game, Captain Anderson from the Mass Effect Trilogy, Franklin from Grand Theft Auto V and Sgt. Johnson from the Halo series. The problem I have with Evan's critique is the fact that he is judging black characters based on how they act and look, something that society does to members of the visible minority in the real world. Majority of the characters that are in question may seem stereotypical at first but if you delve deeper into their character you start to realize that there is depth behind that person rather than just big muscles and a loud mouth. In my opinion, whenever I play a video game I can care less what the race of my character is and I look more towards their development as a character and the story that it is telling. Many "gamers" share this same opinion from research I have done and even in the comment section of this article. I get the notion that he is looking for a character that is "white" but the problem is whenever a black character is given the same characteristics as a white character, they are not well received and are made fun of for being "white washed". There seems to be a double standard with how black characters are portrayed and is also something that will unfortunately never be able to appease to everyone due to the fact that everyone shares a different opinion on how certain types of characters should be portrayed.
3/25/2014
1/11
The Social Construction of "Race"
As our discussions have revealed over the past few weeks, negative or stereotypical representation in media
has real consequences. Such representations not only reflect but also reinforce the marginality of minority
groups. Thus, it follows that the political empowerment of subordinate groups in society--such as women,
youth, people with disabilities, gays and lesbians, the poor--depends in part on changing the way these
groups are represented.
How can we think about the issues of representation and empowerment in relation to racial minorities? First,
we need to gain a better understanding of the social construction of racial and ethnic identity.
Ethnicity
'Ethnicity' and 'race' are linked but distinct categories. Ethnicity is a broad social category that addresses
one’s perceived membership in a larger group based on an attachment to an actual or possible homeland, its
cultural heritage, belief system, political history, language, myths, customs, manners, food, literature, sport, art
or architectural style. Ethnic affiliations are acknowledged and pa.
WIT Financial Accounting Test Chapters 5 and 6
1. From the adjusted trial balance for Worker Products Company given below, prepare a multiple-step income statement in good form.
Worker Products Company
Adjusted Trial Balance
December 31
Debit
Credit
Cash
$9,400
Accounts receivable
25,000
Merchandise inventory
36,000
Office supplies
900
Store equipment
75,000
Accumulated depreciation - store equipment
$22,000
Office equipment
60,000
Accumulated depreciation -office equipment
15,000
Accounts payable
42,000
Notes payable
10,000
F. Worker, Capital
110,700
F. Worker, Withdrawals
48,000
Sales
325,000
Sales discounts
6,000
Sales returns and allowances
16,500
Cost of goods sold
195,000
Sales salaries expense
32,500
Depreciation expense - store equipment
11,000
Depreciation expense - office equipment
7,500
Office supplies expense
1,300
Interest expense
600
Totals
$524,700
$524,700
2. From the adjusted trial balance for Worker Products Company given below, prepare the necessary closing entries.
Worker Products Company
Adjusted Trial Balance
December 31
Debit
Credit
Cash
$9,400
Accounts receivable
25,000
Merchandise inventory
36,000
Office supplies
900
Store equipment
75,000
Accumulated depreciation - store equipment
$22,000
Office equipment
60,000
Accumulated depreciation -office equipment
15,000
Accounts payable
42,000
Notes payable
10,000
F. Worker, Capital
110,700
F. Worker, Withdrawals
48,000
Sales
325,000
Sales discounts
6,000
Sales returns and allowances
16,500
Cost of goods sold
195,000
Sales salaries expense
32,500
Depreciation expense - store equipment
11,000
Depreciation expense - office equipment
7,500
Office supplies expense
1,300
Interest expense
600
Totals
$524,700
$524,700
3. A company made the following merchandise purchases and sales during the month of May:
May 1
Purchased
380 units at
$15 each
May 5
Purchased
270 units at
$17 each
May 10
Sold
400 units at
$50 each
May 20
Purchased
300 units at
$22 each
May 25
Sold
400 units at
$50 each
There was no beginning inventory. If the company uses the LIFO periodic inventory method, what would be the cost of the ending inventory?
4. A company made the following merchandise purchases and sales during the month of May:
May 1
Purchased
380 units at
$15 each
May 5
Purchased
270 units at
$17 each
May 10
Sold
400 units at
$50 each
May 20
Purchased
300 units at
$22 each
May 25
Sold
400 units at
$50 each
There was no beginning inventory. If the company uses the FIFO periodic inventory method, what would be the cost of the ending inventory?
5. Flaxco purchases inventory from overseas and incurs the following costs: the cost of the merchandise is $50,000, credit terms are 2/10, n/30 that apply only to the $50,000; FOB shipping point freight charges are $1,500; insurance during transit is $500; and import duties .
More Related Content
Similar to WinARM - Simulating Advanced RISC Machine Architecture .docx
This is mainly intended for young faculty who are involved in ARM processor architecture teaching. This may also be useful to those who are keen in understanding the secrets of ARM architecture.Very good luck
An Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIMjournalBEEI
This paper deals with the novel design and implementation of asynchronous microprocessor by using HDL on Vivado tool wherein it has the capability of handling even I-Type, R-Type and Jump instructions with multiplier instruction packet. Moreover, it uses separate memory for instructions and data read-write that can be changed at any time. The complete design has been synthesized and simulated using Vivado. The complete design is targeted on Xilinx Virtex-7 FPGA. This paper more focuses on the use of Vivado Tool for advanced FPGA device. By using Vivado we get enhaced analysis result for better view of properly Route & Placed design.
Improving Code Compression Efficiency of MIPS32 Processor using Modified ISAIJMTST Journal
Embedded systems place major role in real world technology. In this memory and code size minimization
reduces the complexity of the system. Code compression techniques address this issue by reducing the
code size of application programs .Large code occupies more space in the Chip and also causes higher
power consumption because of increased memory traffic. In this paper, a modified architecture is proposed
for MIPS32 processor by replacing the Load-store Architecture with Register-store Architecture for some of
the instructions. Using Simple Scalar performance simulator we achieved 67.5% of compression efficiency
for MIPS32 processor with the help of modified ISA.
Smartphones architecture is generally different from
common desktop architectures. It is limited by power, size and
cost of manufacturing with the goal to provide the best
experience for users in a minimum cost. Stemming from this
fact, modern micro-processors are designed with an
architecture that has three main components: an application
processor that executes the end user’s applications, a modem
responding to baseband radio activities, and peripheral devices
for interacting with the end user.
Parallelism
Multicores:
The Cortex A7 MPCore processor implements the ARMv7-A
architecture. The Cortex A7 MPCore processor has one to
four processors in a single multi-processor device. The
following figure shows an example configuration with four
processors [3].
In this paper, we are discussing the architecture of the
application processor of Apple iPhone. Specifically, Apple
iPhone uses ARM Cortex generation of processors as their
core. The following sections discusses this architecture in terms
of Instruction Set Architecture, Memory Hierarchy and
Parallelism.
Realization of high performance run time loadable mips soft-core processoreSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Almaaqal University - Collage of Engineering-Department of Control and Computer Engineering Advanced Computer Architectures, CC408, 4th Year
Advanced Computer Architectures
1. Overview
Computer architecture is a fundamental concept in the field of computer science and engineering. It encompasses the design and structure of computer systems, focusing on how hardware components are organized and interconnected to execute instructions and process data efficiently.
1.1 SISD, MISD, SIMD, MIMD Architectures
Michael Flynn has introduced taxonomy for various computer architectures based on notions of Instruction Streams (IS) and Data Streams (DS). According to this taxonomy, the Computer Architectures could be classified into four categories; Single Instruction Single Data (SISD), Multiple Instruction Single Data (MISD), Single Instruction Multiple Data (SIMD), and Multiple Instruction Multiple Data (MIMD).
Figure 1.1: Flynn Taxonomy of Computer Architecture Let's explore each of them:
Prepared By: Assist. Prof. Dr. Mohammed Al-Ibadi
1
Almaaqal University - Collage of Engineering-Department of Control and Computer Engineering Advanced Computer Architectures, CC408, 4th Year
1. SISD (Single Instruction, Single Data):
SISD architecture is the most basic and traditional form of computing. In this model, a single central processing unit (CPU) executes one instruction at a time on a single piece of data. It's a sequential, linear approach where each instruction is processed one after the other. SISD is commonly found in older, uniprocessor systems.
2. SIMD (Single Instruction, Multiple Data):
In a SIMD architecture, a single instruction is applied simultaneously to multiple data elements. This is achieved through the use of multiple processing units or cores, and each unit processes a different data element simultaneously. SIMD is prevalent in graphics processing units (GPUs) and is well-suited for tasks requiring parallel processing, like image and video processing.
Prepared By: Assist. Prof. Dr. Mohammed Al-Ibadi
2
Almaaqal University - Collage of Engineering-Department of Control and Computer Engineering Advanced Computer Architectures, CC408, 4th Year
3. MISD (Multiple Instruction, Single Data):
MISD architecture is the least common among the four. It involves multiple processing units, each executing its own unique instruction on the same piece of data. This type of architecture has limited practical applications and is often used for experimental or specialized purposes, such as fault-tolerant systems.
4. MIMD (Multiple Instruction, Multiple Data):
MIMD architecture is the most versatile and widely used in modern computing. In MIMD systems, multiple processors or cores independently execute different instructions on separate data. This allows for true parallelism, making it suitable for a wide range of applications, including multi-threaded software, scientific simulations, and distributed computing.
Prepared By: Assist. Prof. Dr. Mohammed Al-I
A 64-Bit RISC Processor Design and Implementation Using VHDL Andrew Yoila
1. Introduction
In today technology digital hardware plays a very important role in field of electronic and computer engineering products today. Due
to fast growing and competition in the technological world and rapid rise of transistor demand and speediness of joined circuits and
steeps declines of the price cause by the improvement in micro-electronics application Machineries. The introduction of computer to
the society has affected so many things in the society in which almost all problems can be solve using computers. Many industries
today are requesting for system developers that have the skills and technical knowhow of designing the program logics. VHDL is one
of the most popular design applications used by designer to implement such task. Reduce instruction set computing (RISC) processor
play a vital role with RISC AND BIST features which most dominants patterns can provide, in systems testing of the circuits below
the tests which is important to the quality component of testing [1]. Although the Reduced instruction set have few instructions sets, as
its bit’s processing’s sizes increase then the test’s patterns become denser and the structure’s faults is kept great. In view to enable the
Operation of the most instructions as registers to registers operation, Arithmetic logic unit is studied and a detail test patterns is being
develop. This report is prepaid keeping in mind where specific application is automated and controlled. This report has 33 instruction
set with MICA architecture. This report will focus mainly on the meaning of
i. RISC processor,
ii. the design,
iii. the architecture,
iv. the data part and the instruction set of the design.
v. VHDL.
Design and implementation of complex floating point processor using fpgaVLSICS Design
This paper presents complete processor hardware with three arithmetic units. The first arithmetic unit can
perform 32-bit integer arithmetic operations. The second unit can perform arithmetic operations such as
addition, subtraction, multiplication, division, and square root on 32-bit floating point numbers. The third
unit can perform arithmetic operations such as addition, subtraction, multiplication on complex numbers.
The specific advancement in this processor is the new architecture introduced for complex arithmetic unit.
In general complex floating point arithmetic hardware consists of floating to fixed and fixed to floating
conversions. But using such hardware will lead to compromise between accuracy and number of bits used
to represent the fixed point equivalent of floating point numbers. The proposed architecture avoids that
compromise and it is implemented with less number of look-up tables to save around 5500 logic gates. The
complex numbers are represented using a subset of IEEE754 standard floating point format, 16-bits for
real part and 16-bits for imaginary part. The floating point arithmetic unit works on 32-bit IEEE754 single
precision numbers. The instruction set is specially designed to support integer, floating point and complex
floating point arithmetic operations. The on-chip RAM is 8kBytes and is extendable up to 64kBytes. As the
processor is designed to implement on FPGA, the embedded block RAMs are utilized as RAM.
Similar to WinARM - Simulating Advanced RISC Machine Architecture .docx (20)
With regards to this article, I agree and disagree on certain leve.docxalanfhall8953
With regards to this article, I agree and disagree on certain levels pertaining to racism in video games. I have been playing video games since the Nintendo days and I have noticed many stereotypes in video games that Evan has pointed out. Although Evan feels that all black characters are subject to stereotypes, there are bunches of game characters that I believe are not under this category and are in fact very ambitious characters. For example, Lee Everett from the Walking Dead: Season 1 game, Captain Anderson from the Mass Effect Trilogy, Franklin from Grand Theft Auto V and Sgt. Johnson from the Halo series. The problem I have with Evan's critique is the fact that he is judging black characters based on how they act and look, something that society does to members of the visible minority in the real world. Majority of the characters that are in question may seem stereotypical at first but if you delve deeper into their character you start to realize that there is depth behind that person rather than just big muscles and a loud mouth. In my opinion, whenever I play a video game I can care less what the race of my character is and I look more towards their development as a character and the story that it is telling. Many "gamers" share this same opinion from research I have done and even in the comment section of this article. I get the notion that he is looking for a character that is "white" but the problem is whenever a black character is given the same characteristics as a white character, they are not well received and are made fun of for being "white washed". There seems to be a double standard with how black characters are portrayed and is also something that will unfortunately never be able to appease to everyone due to the fact that everyone shares a different opinion on how certain types of characters should be portrayed.
3/25/2014
1/11
The Social Construction of "Race"
As our discussions have revealed over the past few weeks, negative or stereotypical representation in media
has real consequences. Such representations not only reflect but also reinforce the marginality of minority
groups. Thus, it follows that the political empowerment of subordinate groups in society--such as women,
youth, people with disabilities, gays and lesbians, the poor--depends in part on changing the way these
groups are represented.
How can we think about the issues of representation and empowerment in relation to racial minorities? First,
we need to gain a better understanding of the social construction of racial and ethnic identity.
Ethnicity
'Ethnicity' and 'race' are linked but distinct categories. Ethnicity is a broad social category that addresses
one’s perceived membership in a larger group based on an attachment to an actual or possible homeland, its
cultural heritage, belief system, political history, language, myths, customs, manners, food, literature, sport, art
or architectural style. Ethnic affiliations are acknowledged and pa.
WIT Financial Accounting Test Chapters 5 and 6
1. From the adjusted trial balance for Worker Products Company given below, prepare a multiple-step income statement in good form.
Worker Products Company
Adjusted Trial Balance
December 31
Debit
Credit
Cash
$9,400
Accounts receivable
25,000
Merchandise inventory
36,000
Office supplies
900
Store equipment
75,000
Accumulated depreciation - store equipment
$22,000
Office equipment
60,000
Accumulated depreciation -office equipment
15,000
Accounts payable
42,000
Notes payable
10,000
F. Worker, Capital
110,700
F. Worker, Withdrawals
48,000
Sales
325,000
Sales discounts
6,000
Sales returns and allowances
16,500
Cost of goods sold
195,000
Sales salaries expense
32,500
Depreciation expense - store equipment
11,000
Depreciation expense - office equipment
7,500
Office supplies expense
1,300
Interest expense
600
Totals
$524,700
$524,700
2. From the adjusted trial balance for Worker Products Company given below, prepare the necessary closing entries.
Worker Products Company
Adjusted Trial Balance
December 31
Debit
Credit
Cash
$9,400
Accounts receivable
25,000
Merchandise inventory
36,000
Office supplies
900
Store equipment
75,000
Accumulated depreciation - store equipment
$22,000
Office equipment
60,000
Accumulated depreciation -office equipment
15,000
Accounts payable
42,000
Notes payable
10,000
F. Worker, Capital
110,700
F. Worker, Withdrawals
48,000
Sales
325,000
Sales discounts
6,000
Sales returns and allowances
16,500
Cost of goods sold
195,000
Sales salaries expense
32,500
Depreciation expense - store equipment
11,000
Depreciation expense - office equipment
7,500
Office supplies expense
1,300
Interest expense
600
Totals
$524,700
$524,700
3. A company made the following merchandise purchases and sales during the month of May:
May 1
Purchased
380 units at
$15 each
May 5
Purchased
270 units at
$17 each
May 10
Sold
400 units at
$50 each
May 20
Purchased
300 units at
$22 each
May 25
Sold
400 units at
$50 each
There was no beginning inventory. If the company uses the LIFO periodic inventory method, what would be the cost of the ending inventory?
4. A company made the following merchandise purchases and sales during the month of May:
May 1
Purchased
380 units at
$15 each
May 5
Purchased
270 units at
$17 each
May 10
Sold
400 units at
$50 each
May 20
Purchased
300 units at
$22 each
May 25
Sold
400 units at
$50 each
There was no beginning inventory. If the company uses the FIFO periodic inventory method, what would be the cost of the ending inventory?
5. Flaxco purchases inventory from overseas and incurs the following costs: the cost of the merchandise is $50,000, credit terms are 2/10, n/30 that apply only to the $50,000; FOB shipping point freight charges are $1,500; insurance during transit is $500; and import duties .
Windows Server Deployment ProposalOverviewEach student will .docxalanfhall8953
Windows Server Deployment Proposal
Overview
Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.
Scenario
Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WAI with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WAI wishes to implement the “right” solution to fit their needs now and for the next 2-3 years.
There are several details about WAI which will have an impact on your choices:
· WAI will start with 110 employees, in the following departments:
· Executives (9 employees) – manage and run the company
· Accounts and Sales Department (15 employees) – perform market research and maintain accounts
· Creative, Media and Production Department (59 employees) – advertising
· Human Resources and Finances (17 employees) – perform HR and financial duties
· IT (10 employees) – manage IT for the company
· WAI will have two sites, one in Seattle and one in New York. Most staff will be located in Seattle, with at least 1 person from each of the departments above located in NY.
· Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity.
· Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
· Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company’s financial details). Your team may make assumptions about how data should be shared or kept private.
· Assumptions can be made regarding any information not included here; all assumptions should be identified, however.
Topics to Cover
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.
Describe the technical and business reasons for each choice, citing other resources as appropriate.
The Windows Server 2012 operating system should be used for all aspects of the solution.
The topics inclu.
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxalanfhall8953
Willowbrook School
Background
Willowbrook School is a small, private school in the Midwest United States. For the past 20 years, it has offered a curriculum for preschool through 6th grade. Five years ago it expanded to offer after-school care, usually referred to as after care, on premises. After care is not only offered to Willowbrook’s students, but also for students of other schools in the area.
As an independent systems analyst working as a team, you work as an IT consultant, specializing in developing IT solutions for small businesses. You have been contacted by the director, Victoria Owens, to discuss the possibility of setting up a computer system to handle some of the school’s administrative and financial tasks. She explains to you that Willowbrook is experiencing significant increases in enrollment applications for all programs. Increases in applications, coupled with increased demand for after-school care, have led to a very high workload for the administrative personnel and staff. The principal and teachers have stepped in where possible, but the demand is becoming too great. Willowbrook School is a non-profit, and is not in a position to hire another full-time administrative position, which is what the principal and director think would be needed to handle the increased workload. You agree to meet with Victoria and the principal, Kathy Gilliard next week to discuss the school and its need for an information system.
You sit down with Victoria and Kathy on Wednesday to ask them some questions to help you determine what type of information system they need. You explain to them that information systems bring computer hardware and software together with people, processes, and data to produce specific results. They are excited to tell you about their situation and what they have in mind for a computer system to help with some of the work load. To help you with planning for the information system, you ask them about what personnel they have, as well as some questions to determine what types of information each person needs to do their job.
Victoria explains her role as the executive director of the school. She administers the activities of the school in accordance with the mission, vision, and policies established by the Board of Directors. She supports the educational staff and oversees the financial, payroll, and human resources functions for the school. She also prepares all necessary reports and evaluations for the state and local school boards. Kathy says that as the principal of Willowbrook she handles the academic and curricular issues that arise, and ensures that the school meets all federal and state educational standards. Kathy and the teachers who report to her make decisions jointly about admissions and assignments to classrooms. The two kitchen staff personnel, a head cook and an assistant, also report to the principal. She also coordinates students’ bus transportation schedule. The school contracts with a local bussing co.
Wind PowerUsed For Millennia Variations in alb.docxalanfhall8953
Wind Power
Used For Millennia
Variations in albedo
Wind
The Uneven Heating of the Surface
Annual average net radiation from the Earth’s surface 1995 - 1986
Areas of heat gain and loss on Earth’s surface
Re-distribution of Excess Heat
Atmospheric Circulation on a Non-rotating
Earth
One cell in each hemisphere.
Warm air rises at the equator and moves north.
Cool air sinks at the poles and flows toward the equator.
Coriolis Effect
Coriolis Effect: tendency of a fluid (water or air) to be deflected from
its straight-line path as it moves across the Earth’s surface.
Deflection of a moving object is to the Right in the Northern
Hemisphere and Left in the Southern Hemisphere.
High Pressure
High Pressure
Low Pressure
High Pressure
Rising air
Descending air
Low Pressure
Descending Air
Rising air
Low pressure
Descending air
Atmospheric Circulation on a Rotating Earth
InterTropical Convergence Zone
(another source of wind)
Wind Generation
Turbine Blades
Inside of Wind Turbine
Size Scale of Wind Turbines
Small Scale Wind Power (Domestic systems)
Large Scale Wind Power (Grid Systems)
Wind Characteristics
Highly variable at several different timescales:
From hour to hour
Daily
Seasonally
High demand may not correspond to peak winds.
Instantaneous electrical generation and consumption must remain in
balance to maintain the grid stability.
Intermittent winds pose problem for wind power. Backup generation
capacity (fossil fuels) or energy storage (pump storage) may be
needed.
Turbine Size
Domestic size Grid size
Early Wind Farms
Limited output per turbine.
Required large numbers of turbines.
Large Scale Wind Turbines
Note bus
New Wind Turbine Designs
Learning From Nature
Humpback Whale Blade design
Potential Wind Energy Regions
Wind & Water
Ocean wind farm off Denmark
Energy Output Vs. Wind Velocity
Each potential wind farm has its own wind characteristics
Advantages of Wind Power
• No fuel consumed.
• No air pollution.
• Energy used to build a wind power plant equals the
energy produced by the plant in a few months time =
pays for itself.
• Allows for multiple land use in farming and electrical
generation.
Surprising Resistance to Wind Power
Environmental Effects
Danger to birds and bats.
Noisy (whooof, whooof)
Medical problems
Aesthetics (Cape Cod).
Danger to birds and bats
Danger to birds and bats
Birdwatchers in UK flock to see rare
bird, then watch it killed by wind turbine
Bird Friendly Compressed Air
Turbine
Perceived Wind Noise
San Gorgoino Pass, California
Near Palm Springs, popular resort
New Wind Farm Proposal
Cape Cod Wind Farm
Against
Against
Can’t Please Everybody
Artist Rendition of Proposed Cape
Cod Wind Farm
Cape Cod wind farm would not be visible for
more that 7 - 8 months a year due to haze.
Isle of Lewis, Scotland
Isle of Lewis Standing Stones
La Venta,.
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxalanfhall8953
winter 2013 235
CREATE A CONTRACT
Instructions:
I will give you a fact scenario below that involves some college students who are having difficulty living together as roommates.
Your task will be to create a contract to solve the problems and issues that the fact pattern raises. Hint I had (sixteen) 16 issues when I did the assignment.
After you create the contract, you will then include around a two page written description about WHY you chose to design the provisions of the contract the way you did.
Your grade will be based on:
1. Whether your contract identifies and solves the problems
2. Whether your contract is realistic
a. (ie a clause that says no roommate shall ever enter the room of another roommate is not practical because what if you hear them yelling for help, or if you haven’t seen them in 14 days.) I want you to think about “loopholes” and the “what if” types of things that can go wrong.
3. Language… Really in this assignment PLEASE pay attention to the words you type because one missing word can make the contract really silly… In last year’s contracts I had someone write… A roommate can eat any food in the apartment that has their name on it… (Great give me a pen and I’ll just put my name on everything).
4. Your explanation, did you have sound reasoning for putting in something in the contract.
5. Following the LAW:… This assignment requires you to have a general understanding of what a contract is and how it works… That is, after all, what we have been studying.
a. Do not include items in your contract that are illegal or are not a contract… For example do not say if the roommate leaves the toilet seat up, they will place their hands on the toilet and have their fingers slammed 10 times by the toilet seat. (That’s not enforceable)
b. Do NOT include something like… If roommate “brion” doesn’t like the punishment he can change it to what he wants, or if I don’t want to follow this rule I don’t have to”… (It is not a contract if one person can CHOOSE to not follow something, It also not a contract when you leave punishments, requirements ect for the “future to be determined”
6. Creativity/problem solving/format of contract
a. You must follow the general format of a contract I have included after the fact scenario… Trust me I am including the sections that ALL your contracts must have for your benefit. It will make organizing it a lot easier for you.
b. You must CHOOSE to write your contract from the viewpoint of one of the four people below or as a disinterested outside party… This is critical because if you are writing the contract from the perspective of one of the people it should FAVOR that person (in a reasonable way), if you are writing as a disinterested third party (an attorney) you should try and be as fair to all as possible.
c. In your explanation tell me from what viewpoint…actually make that your first sentence.
******************************************************************
.
WinEst As 1. Es2. Tassignment stInfo (Esti.docxalanfhall8953
WinEst As
1. Es
2. Ta
ssignment
stInfo (Estim
a. Name
b. Due:
c. Estima
d. Start
e. Estima
f. Rate
i.
ii.
ake Off (Ite
mate Inform
e: Driveway
1 month fro
ate Type: B
Date: Toda
ate Status:
Tables:
Sample L
Sample E
ems)
P
C
mation)
y Proposal
om today
udgetary
ay
Submitted
abor Rates
quipment R
Page 1 of 2
COMPU
Rates
TERS FO
Engi
OR CONS
TEC
neering Tec
Un
Colleg
STRUCTI
CHNOLO
hnology Pro
niversity of To
ge of Engine
ON
OGY
gram
oledo
eering
Page 2 of 2
3. Adding Markups
a. Add Net Markup
i. Name: Overhead and Profit
ii. Type: 15%
b. Add Sales Tax
i. Name: Sales Tax
ii. Type: 6.5%
iii. Restrict this Tax Markup to: Material
4. Print Report
a. Report 1:
i. Sheet View, set Filter to “’95 Div Details”
ii. File -> Print Preview -> Style
1. Layout: Landscape
2. Header/Footer -> Custom Header
a. Left Text (Use Field Tags…)
i. Est Info – Project Name
ii. Est Info – Start Date
iii. Est Info – Due Date
b. Center Text (Use Field Tags…)
i. Est Info – Type
ii. Est Info – Status
c. Right Text
i. Name
ii. Professor Name
iii. Class
iv. Date
b. Report 2:
i. Totals View
ii. File -> Print Preview
1. Ensure the Layout and Headers match Report 1
5. DUE: Monday, April 7, 2014 by 5:00 pm
1
Getting Started with WinEst
Sample Exercise v10.1
Professional Cost Estimating and Budgeting
Things you need to know about WinEst
Pull Down Menus & Tool Bars
There are different ways to view your toolbar in WinEst. Here are 2 examples. If you prefer large toolbar buttons,
select ‘Preferences’ from the ‘Tools’ menu option. Now select the Toolbars option from the displayed list of
preferences. To the right, under ‘Style’, change the Images to ‘Large’. Click OK.
Toolbar - Small Images with Short Text
Toolbar - Large Images with Text
WinEst has pull down menus for each of the following - File, Edit, View, Filters, Tables, Tools, Database, Reports,
Custom, Window and Help. When the mouse is clicked on one of these menu items, a list drops down and the
available commands display for that menu. Scan the menus to see the features available in the WinEst program.
Help
Help is always available. You can select the Contents command on the Help menu or press the F1 key to view
help.
2
Navigating in WinEst
WinEst has three main views. These enable you to follow a structured method for building and reviewing your
estimates. You can move from view to view at any time by clicking one of the corresponding toolbar buttons
(‘Takeoff’, ‘Sheet’ and ‘Totals’) or by making selections from the ‘View’ Menu.
Takeoff View
This view is for adding items to your estimate from the price book Database. From here you can:
• Lookup items in the database
• Perform takeoff calculations
• Assign Work Breakdown Structures (WBS) to items
• Analyze the Item takeoff audit trail
• Enter unique, “one time” items
• Add notes to it.
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxalanfhall8953
Wiley Plus Brief Exercise 6 –Accounting 100
Brief Exercise 6-1
Brief Exercise 6-1
Farley Company identifies the following items for possible inclusion in the taking of a physical inventory.
Indicate whether each item should be "Included" or "Not Included" from the inventory taking.
(a)
Goods shipped on consignment by Farley to another company.
(b)
Goods in transit from a supplier shipped FOB destination.
(c)
Goods sold but being held for customer pickup.
(d)
Goods held on consignment from another company.
Brief Exercise 6-2
Wilbur Company has the following items:
Indicate whether each item should be "Included" or "Not Included" from the inventory taking.
(a)
Freight-In
(b)
Purchase Returns and Allowances
(c)
Purchases
(d)
Sales Discounts
(e)
Purchase Discounts
Brief Exercise 6-8
Pettit Company reports net income of $90,000 in 2014. However, ending inventory was understated $7,000.
What is the correct net income for 2014?
The correct net income for 2014
$
Warning
Don't show me this message again for the assignment
Ok
Cancel
Click if you would like to Show Work for this question:
Open Show Work
Brief Exercise 6-9 (Part Level Submission)
At December 31, 2014, the following information was available for A. Kamble Company: ending inventory $40,000, beginning inventory $60,000, cost of goods sold $270,000, and sales revenue $380,000.
Warning
Don't show me this message again for the assignment
Ok
Cancel
(a)
Calculate inventory turnover for A. Kamble Company. (Round answer to 1 decimal place, e.g. 1.5.)
Inventory turnover
times
Warning
Don't show me this message again for the assignment
Ok
Cancel
Click if you would like to Show Work for this question:
Open Show Work
Modify Show Work
Exercise 6-1
Tri-State Bank and Trust is considering giving Josef Company a loan. Before doing so, management decides that further discussions with Josef’s accountant may be desirable. One area of particular concern is the inventory account, which has a year-end balance of $297,000. Discussions with the accountant reveal the following.
1.
Josef sold goods costing $38,000 to Sorci Company, FOB shipping point, on December 28. The goods are not expected to arrive at Sorci until January 12. The goods were not included in the physical inventory because they were not in the warehouse.
2.
The physical count of the inventory did not include goods costing $95,000 that were shipped to Josef FOB destination on December 27 and were still in transit at year-end.
3.
Josef received goods costing $22,000 on January 2. The goods were shipped FOB shipping point on December 26 by Solita Co. The goods were not included in the physical count.
4.
Josef sold goods costing $35,000 to Natali Co., FOB destination, on December 30. The goods were received at Natali on January 8. They were not included in Josef's physical inventory.
5.
Josef received goods costing $44,000 on January 2 that were sh.
Winter 2011 • Morality in Education 35Workplace Bullying .docxalanfhall8953
Winter 2011 • Morality in Education 35
Workplace Bullying: Costly and
Preventable
By Terry L Wiedmer
W orkplace bullying is a pervasive practice by malicious individuals who seekpower, control,domination, and subjugation. In businesses or schools, such bullying is an inefficient
way of working that is both costly and preventable. Senior management and executives are
ultimately responsible for creating and sustaining bully-free workplaces. Workplace bullies can be
stopped if employees and employers work together to establish and enforce appropriate workplace
policies and practices. This article presents information about workplace bullying, including its
prevalence, targeted individuals, bullying behaviors, employer practices, and steps to prevent
bullying. In the end, leadership and an environment of respect provide the ultimate formula for
stopping workplace bullying.
Bullying occurs between and among people in all venues—in the home, community, and
workplace. It is a pervasive, targeted, and planned effort that can be overtly obvious or
can fly under the radar and is conducted by practiced and malicious individuals who seek
power, control, domination, and subjugation. The impacts of such actions—in terms of
finances, emotions, health, morale, and overall productivity—are destructive, and the
ramifications are limitless (Mattice, 2009). Because no one is immune from the potential of
being subjected to bullying in the workplace, this topic merits further review and analysis
(Van Dusen, 2008). :
To combat workplace bullying, often referred to as psychological harassment or
violence (Workplace Bullying Institute [WBI], 2007), employers must have a full range of
policies in place and means available to them to create and maintain a healthy workplace
culture and climate. Although they are not generally for-profit endeavors, schools and
school systems are purposeful businesses that share the same concerns and have the same
responsibility to ensure that each employee works in a respectful environment and is not
subjected to workplace bullies.
Workplace Bullying •
According to the Workforce Bullying Institute (WBI), workplace bullying is
the repeated, health-harming mistreatment of one or more persons (the targets)
by one or more perpetrators that takes one or more of the following forms: verbal
abuse; offensive conduct/behaviors (including nonverbal) which are threatening,
humiliating, or intimidating; and work interference—sabotage—which prevents
work from getting done. (Definition of Workplace Bullying, para. 1)
Bullies seek to induce harm, jeopardize one's career and job, and destroy interpersonal
relationships. The behaviors of bullies harm people and ravage profits.
36 The Delta Kappa Gamma Bulletin
Prevalence of Workplace Bullying
Thirty-seven percent of U.S. workforce members report being bullied at work; this amounts
to an estimated 54 million Americans, which translates to nearly the entire population of
the states of Wash.
With the competitive advantage that Crocs’ supply chain holds, the.docxalanfhall8953
With the competitive advantage that Crocs’ supply chain holds, the company also wants to be able to sustain their customers’ satisfaction. In doing this, they must make sure that their transformation process is producing consistent output especially when new products are introduced. This can be achieved by having a solid quality control system.
With the quality control system, inspections are to take place at three critical points. The first one is before production, which involves the raw materials in Crocs’ case that would be the raw materials, or chemicals that they purchase in pellet form. This first step can be eliminated by through supplier certification. The second critical point is during the production process. Process quality control takes place, which involves statistical process control. Periodic samples are taken from a continuous production, as long as sample measurements fall within the control limit the production will continue. However, if the samples fall outside the control limits, the process is stopped and a search is made for an assignable cause. In this case, the process will use a quality control chart known as an attribute control chart. The whole purpose is to find the natural random variability in the output oppose to unnecessary variations. The company must maintain that natural random variability to be under statistical control. The last critical point is after production. Following these inspections is process capability. Process capability is assessed once the process is under statistical control. It is the ability of the process to meet or exceed customers’ specifications. Process capability is determined by using the process capability index. If the process is unable to meet the customer specifications the following step is continuous improvement in which case seven tools are used including a flow chart, check sheet, histogram, Pareto chart, cause and effect, scatter diagram and a control chart. These tools are then incorporated into an improvement approach known as Six Sigma. Six Sigma includes five steps:
1. Defining a process for improvement
2. Measuring the variables and setting goals for improvement
3. Analyzing the root causes in which case the seven tools are referred to
4. Making improvements
5. Implementing a control plan to ensure that changes are permanent
In furthering research on Crocs, it has been stated in online reviews by various customers that they have experienced defects in the seam of their shoes, cases in which their shoe had shrunk or didn’t fit at all, Crocs’ flip flops tearing apart, holes appearing in their shoes, and the smell of the shoes. These reviews are accessible to many consumers, and are capable of tainting the reputation of Crocs. Reviews such as these are important to pay attention to because it’s proof of the importance of solidifying an efficient quality control system. It is especially important when introducing new products, and the use of different materials. .
Wind power resources on the eastern U.S. continental shelf are est.docxalanfhall8953
Wind power resources on the eastern U.S. continental shelf are estimated to be over 400 GW, several times the electricity used by U.S. eastern coastal states. The first U.S. developer proposes to build 130 large (40 story tall) wind turbines in Nan- tucket Sound, just outside Massachusetts state waters. These would provide 420 MW at market prices, enough electricity for most of Cape Cod. The project is opposed by a vigorous and well-financed coalition. Polling shows local public opinion on the project almost equally divided. This article draws on semistructured interviews with residents of Cape Cod to analyze values, beliefs, and logic of supporters and oppo- nents. For example, one value found to lead to opposition is that the ocean is a special place that should be kept natural and free of human intrusion. One line of argument found to lead to support is: The war in Iraq is problematic, this war is “really” over petroleum, Cape Cod generates electricity from oil, therefore, the wind project would improve U.S. security. Based on analysis of the values and reasoning behind our interview data, we identify four issues that are relevant but not currently part of the debate.
Introduction
Recent assessments of renewable energy show that wind power has, since the turn of the century, become cost-competitive in the sites with the most favorable wind regimes (Herzog et al., 2001). Until very recently, large-scale North American wind resources were believed to exist in the Great Plains of the United States, northern Canada, and central Canada only (Grubb & Meyer, 1993). Although these huge resources are enough to meet the entire continent’s electrical needs, they are distant from the large coastal cities where electricity is primarily consumed—imposing a need for costly large-scale transmission lines (Cavallo, 1995). In just the last couple of years, it has been recog- nized that the Atlantic Ocean also has a large wind resource on the continental shelf, close to East Coast cities. Three or four manufacturers have developed large wind elec- tric turbines designed to be placed offshore, in waters up to 20–30 m in depth. To date these have been placed only in European waters. By late 2003, the resources, the tech- nology, and the economic viability had all come together in the Eastern United States, potentially allowing large-scale deployment to begin by 2005.
The furthest advanced of a handful of proposed U.S. offshore wind developments is in Nantucket Sound, off the Southern coast of Cape Cod, Massachusetts. This proposal has engendered a widespread, well-organized, well-financed, and politically potent op- position. This movement’s strength, and the apparent contradiction of such opposition coming from a population thought of as politically liberal and environmentally con- cerned, have garnered national press coverage (e.g., Burkett, 2003). A second project was proposed by the Long Island Power Authority for the southern edge of Long Island, with an .
Wilco Corporation has the following account balances at December 3.docxalanfhall8953
Wilco Corporation has the following account balances at December 31, 2012.
Common stock, $5 par value
$555,600
Treasury stock
90,720
Retained earnings
2,426,200
Paid-in capital in excess of par—common stock
1,321,900
Prepare Wilco’s December 31, 2012, stockholders’ equity section. (For preferred stock, common stock and treasury stock enter the account name only and do not provide the descriptive information provided in the question.)
WILCO CORPORATION
Stockholders’ Equity
December 31, 2012
$
:
$
Sprinkle Inc. has outstanding 10,050 shares of $10 par value common stock. On July 1, 2012, Sprinkle reacquired 107 shares at $89 per share. On September 1, Sprinkle reissued 61 shares at $90 per share. On November 1, Sprinkle reissued 46 shares at $85 per share.
Prepare Sprinkle’s journal entries to record these transactions using the cost method. (If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts. Credit account titles are automatically indented when amount is entered. Do not indent manually.)
Date
Account Titles and Explanation
Debit
Credit
7/1/12
9/1/12
11/1/12
Graves Mining Company declared, on April 20, a dividend of $519,800, on its $5 par common stock, payable on June 1. Of this amount, $133,700 is a return of capital.
Prepare the April 20 and June 1 entries for Graves. (If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts. Credit account titles are automatically indented when amount is entered. Do not indent manually.)
Date
Account Titles and Explanation
Debit
Credit
Apr. 20
June 1
Apr. 20 Retained Earnings = ($519,800 – $133,700) = $386,100
Abernathy Corporation was organized on January 1, 2012. It is authorized to issue 10,290 shares of 8%, $65 par value preferred stock, and 544,000 shares of no-par common stock with a stated value of $2 per share. The following stock transactions were completed during the first year.
Jan. 10
Issued 80,330 shares of common stock for cash at $6 per share.
Mar. 1
Issued 5,670 shares of preferred stock for cash at $113 per share.
Apr. 1
Issued 24,730 shares of common stock for land. The asking price of the land was $90,540; the fair value of the land was $80,330.
May 1
Issued 80,330 shares of common stock for cash at $9 per share.
Aug. 1
Issued 10,290 shares of common stock to attorneys in payment of their bill of $50,620 for services rendered in helping the company organize.
Sept. 1
Issued 10,290 shares of common stock for cash at $11 per share.
Nov. 1
Issued 1,940 shares of preferred stock for cash at $115 per share.
Prepare the journal entries to record the above transactions. (If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts. Credit account titles are automatically indented when amount is entered. Do not indent manually.)
Date
Account Titles and Explanation
Debit
Credit
Jan. 10
M.
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxalanfhall8953
Wilson Majee
Technology Diffusion, S-Curve, and Innovation-Decision Process
In this week's reflection report I will discuss technology diffusion, S-Curves and innovation
decision process. I will use the healthcare industry as an example. Our healthcare system is ever
evolving - new technologies, insurance models, and information systems are shaping the system
on a daily basis. Despites these changes and the huge healthcare expenditures (16 of GDP in
America compared to 8 in United Kingdom), Americans are comparatively not any healthier
than citizens in most other developed nations (Merson, Black, & Mills, 2012). The disconnect
between investments in technology and health outcomes is a concern of us all. It makes as
question technology diffusion within the healthcare system: are investments in health system
being spent efficiently? Are consumers really resistant to changes that benefit their health? Or
are there issues with technology diffusion as a practice.
Diffusion is the process by which an innovation is spread through a population. Ironically,
people and institutions, generally, do not like change. Change is viewed as painful, difficult and
times creating uncertainties. Because of this, and for the healthcare industry, huge amounts of
resources are devoted either to promoting innovations (for example, selling the latest drug,
imaging system, medical device etc.) or to preventing innovations from disrupting the status quo.
Although many successful healthcare innovations are aimed at making people healthier, at
relatively smaller increases in costs, IT usage in healthcare has always lagged other industries -
ERH are a good example. Adoption of ERH was slow. Literature on technology diffusion states
that successful implementation is influenced by the compatibility and complexity of the
innovation, organizational context, and the characteristics of the implementation strategy (Cain
M, & Mittman, 2002; Rogers, 1995). People respond to these factors differently resulting in an
S-shaped curve illustration of the adoption process.
The S-curve model shows that any innovation is first adopted by a few people/organizations and
as more use it, and confidence is built around the technology, other will begin to use it. Because
of the inherent uncertainty to new innovations, the decision to adopt an innovation takes time.
However, "once the diffusion reaches a level of critical mass, it proceeds rapidly. Eventually a
point is reached where the population is less likely to adopt the innovation, and spread slows
down. The S-curve implies a hierarchy of adopters, starting with innovators, early adopters, early
majority, late majority and laggards (Rogers, 1995). In other words the S-curve explains the
innovation-decision process: the process through which an individual/organization passes
through from when they gain knowledge of an innovation, to forming an attitude, to the decision
to accept or reject the innovation, .
William PennWhat religion was William PennWilliam Pen was fr.docxalanfhall8953
William Penn
What religion was William Penn?
William Pen was from an Anglican family that was very distinguished. His father was Sir William Pen who was a landowner. At twenty two, Penn decided to join the Quakers which was also referred to as the Religious Society of Friends. The Quakers used to obey the inner light and they believed that the inner light came directly from God. They refused to take their hats off or even bow for any man. They also refused to take their arms up. Their beliefs were completely different as compared to the beliefs that the other Christians had (Barbour & Frost, 1988).
The Oxford University in England expelled Penn in the year 1662 since he refused to conform to the teachings of the Anglican Church. He could publicly state his beliefs and he could also print some of the things that he believed in.
Quakers’ founder was George Foxx who was a close friend to Penn. Cromwell’s death was a time of turmoil to the Quakers since they were suspected for the death. They were suspected because they had beliefs that differed from the religion that had been imposed for the state. They had also refused to swear a loyalty oath to Cromwell, who was the king. Quakers did not swear since Christ had commanded people not to swear.
The religious views that Penn had were a distress to his father. Naval service had helped him earn an Ireland estate and he had always hoped that the intelligence and charisma that his son had could help him in winning favor at the Charles II court. However, that could not happen since his son was always arrested. Penn and George Foxx were frequent companions since they could always travel together in order to spread their ministry. He also wrote a comprehension that was detailed and comprehensive regarding Quakerism. After the death of his father in 1670, Penn inherited the estates of the family and he could frequently visit the court of King Charles II where he was always campaigning for freedom in religion (Penn, 1794).
Where was William Penn born?
William Penn was born in London, United Kingdom. He was born on fourteenth of October in the year 1644. He was a privileged son since he was born by a gentleman who was a land owner. Thomas Loe, who was a Quaker minister, greatly affected Penn by his teachings.
In 1677 a group of important men all from Penn’s religion received a land area in the Colonies for them to settle. Penn himself remained in England but wrote a government for this new community. In what part of the US was this land area located?
In the year 1677, the Quakers relocated to another land. The city of Burlington is located in the Burlington County in New Jersey. It is Philadelphia’s suburb. The Quakers settlers moved to Burlington. Burlington served as West Jersey’s capital until the year 1702. The Quakers were able to formally establish their congregation in the year 1678. Initially, they could meet in private homes. However, between 1683 and 1687, a hexagonal house that was made .
William PennOne of the most memorable people in United States re.docxalanfhall8953
William Penn
One of the most memorable people in United States religious history whose efforts are still evident in this twenty first century is William Penn. In today’s America, Penn is recognized through the Religious Society of Friends (Quakers) as their chief. Penn is also well remembered through the city of Philadelphia, which was in fact, the first city for Penn to plan and build in his colony. His writing capabilities can also not go unmentioned. In fact, one of his most important works is No Cross, No Crown; A Discourse Showing the Nature and Discipline of the Holy Cross of Christ—a well-known Christian classic. This essay explores different facets of William Penn including his position as icon in the Capitol, his relations with Native Americans, his planning of Philadelphia, and particularly, his affiliation with the Quakers. It is because of Penn’s political intelligence coupled with his strong beliefs in religious tolerance that he is considered one of America’s early heroes.
William Penn was from an Anglican family that was very distinguished because they adherents of English Church. His father was Sir William Penn, a landowner. At twenty two, Penn decided to join the Quakers, which were also referred to as the Religious Society of Friends. The Quakers obeyed the “inner light”, which they believed to have come directly from God. They refused to take their hats off or even bow for any man. They also refused to take up arms. Their beliefs were completely different compared to beliefs that other Christians had (Barbour and Frost 167). The Oxford University in England expelled Penn in the year 1662 when he refused to conform to the teachings of the Anglican Church. He used to publicly state his beliefs and he printed some of the things that he believed in. At that time, there was no freedom of speech in England.
The Quakers’ founder, George Foxx was a close friend to Penn. Oliver Cromwell’s death was a time of turmoil to the Quakers since they were suspected for the death because they had beliefs that differed from the religion that had been imposed for the state. ****** They had also refused to swear a loyalty oath to Cromwell, who was the king. Quakers did not swear since Christ had commanded people not to swear (Penn 21). The religious views that Penn had were a distress to his father. Naval service had helped him earn an Ireland estate and he had always hoped that the intelligence and charisma that his son had could help him in winning favor at Charles II court. However, that could not happen since his son was always arrested. Penn and George Foxx were frequent companions since they could always travel together in order to spread their ministry (Penn 20). He also wrote a comprehension that was detailed and comprehensive regarding Quakerism. After the death of his father in 1670, Penn inherited the estates of the family and he could frequently visit the court of King Charles II where he was always campaigning for freedom in relig.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
1. WinARM - Simulating Advanced RISC Machine Architecture
Shuqiang Zhang
Department of Computer Science
Columbia University
New York, NY
[email protected]
Abstract
This paper discusses the design and imple-
mentation of the WinARM, a simulator imple-
mented in C for the Advanced RISC Machine
(ARM) processor. The intended users of this tool
are those individuals interested in learning com-
puter architecture, particularly those with an inter-
est in the Advanced RISC Machine processor fam-
ily.
WinARM facilitates the learning of computer
architecture by offering a hands-on approach to
those who have no access to the actual hardware.
The core of the simulator is implemented in C with
and models a fetch-decode-execute paradigm; a
Visual Basic GUI is included to give users an in-
teractive environment to observe different stages
2. of the simulation process.
1. Introduction:
This paper describes how to simulate an
ARM processor using the C programming lan-
guage. In the course of this discussion, the reader
is introduced to the details of the ARM processor
architecture and discovers how the hardware
specifications are simulated in software using
execution-driven simulation. Execution driven
simulation is also know as instruction-level simu-
lation, register-cycle simulation or cycle-by-cycle
simulation [3]. Instruction level simulation con-
sists of fetch, decode and execution phases [4].
ARM processors were first designed and
manufactured by Acorn Computer Group in the
mid 1980’s [1]. Due to its high performance and
power efficiency, ARM processors can be found
on wide range of electronic devices, such as Sony
Playstation, Nintendo Game Boy Advance and
Compaq iPAQs. The 32-bit microprocessor was
designed using RISC architecture with data proc-
essing operations occurring in registers instead of
memory. The processor has 16 visible 32 bit regis-
ters and a reduced instruction set that is 32-bits
wide. The details on the registers and instructions
can be obtained from the ARM Architectural Ref-
erence Manual [2].
2. Related Works:
3. This section discusses different types of
simulators available today and their different ap-
proaches in design and implementation. Most
simulation tools can be classified as user level
simulators: these simulate the execution of a proc-
ess and emulate any system calls made on the tar-
get computer using the operating system of the
host computer [5]. WinARM is an example of this
type of simulator; it executes ARM instructions on
a host Pentium x86 processor using a
fetch-decode-execute paradigm. KScalar Simulator
[Moure 6], PPS suite [7], CPU Sim3.1 [8] and OA-
Mulator [9] are simulators best suited for educa-
tional purposes. They show the basic ideas of com-
puter organization with relatively few details and
complexity. They are specifically designed for stu-
dents who have little or no background in com-
puter architecture and who need a simple introduc-
tion [6]. WinARM also belongs in this category
because it provides a concise and straightforward
introduction to the ARM architecture. On the other
extreme of the spectrum is the SPARC V9 Com-
plete Machine Simulator, one of the many
well-know complete machine simulators devel-
oped to date. These simulate the target computer
from the boot stage, including all codes executed
by the PROM, the OS that is loaded by the PROM,
and any processes subsequently created [5]. An-
other approach to processor simulation can be seen
in the Simx86 simulator. The Simx86 abandons
the traditional simulator implementation approach
of pre-decoding instructions and cross compilation.
Instead, Simx86 favors an object oriented ap-
proach to improve extensibility of the simulator at
4. the cost of increased execution time. The Simx86
provides a straightforward way to build a simulator
for a processor by allowing each component
Figure 1. ARM Architecture
of the processor to be represented directly in the
simulator by an object. The simulator can easily be
extended by adding new classes of instructions
without the daunting task of constructing a new
simulator [10]. WinARM, on the other hand, re-
tains the traditional approach for building simula-
tors, and is composed of fetch, decoding and exe-
cution phases [4]. This approach tends to favor
execution speed of the simulators [10].
3. Designing and Building WinARM
The basic approach in designing WinARM is
to simulate all the necessary components of the
ARM architecture in C code. This includes the
register bank, instruction decoder, the 32-bit ALU
and all other components. Figure 1 shows a de-
tailed view of the major components in the ARM
architecture and how they interact with each other.
The sixteen 32-bit user level registers, stack
space, and memory of the ARM architecture are all
modeled using arrays of unsigned long types.
The fetch-decode-execute paradigm of the ARM
instruction set is simulated via several C functions
5. that get passed the 32-bit instructions. The de-
code function determines the type of the instruc-
tion based on its bit pattern and calls the appropri-
ate instruction execution function. See Figure 2
for details on the instruction set of the ARM proc-
essor.
The traditional approach of building simula-
tors which focuses on pre-decoding instructions to
an intermediate representation and cross compila-
tion [10] is also used for building the WinARM
simulator,. Therefore, a cross compiler is re-
quired to generate ARM machine code to run on
the host Pentium x86 machine.
Finally, a visual basic GUI is included in the
simulator to provide users of WinARM an interac-
tive environment to work in.
3.1 Cross Compilation
The idea behind simulation is to be able to
‘execute’ non-native code on a host machine.
In order to obtain non-native machine code, a cross
compiler is required. Many free versions of the
ARM cross compiler are readily available on the
Figure 2. ARM instruction Set
world wide web. The one used for this simulator
6. was created by Jason Wilkins ([email protected] io.com).
3.2 Instruction Fetching
Once ARM machine code has been obtained
using a cross compiler, the instruction fetching
process begins. The object file generated by the
assembler is read 32 bits at a time since all ARM
instructions are 32-bits wide. The header and
footer sections of the object file, which contains
ARM system information, are discarded because
they are not used by the simulator. All the
fetched instructions are then stored in the Program
Memory space, which is modeled by a fixed size
array of unsigned long type. After all the instruc-
tions are fetched and stored, the Decoding stage
begins.
3.3 Instruction Decoding
All of the ARM instructions are 32-bits wide,
with a predefined and distinct bit pattern. Wi-
nARM uses these bit patterns to determine the type
of the instruction being decoded, and calls ap-
propriate execution functions to execute each spe-
cific instruction. See figure 2 for the bit patterns of
each type of ARM instruction. The decoding
process isolates the bit pattern of each incoming
instruction and compares it to the set of predefined
bit pattern, if there is a match, the instruction is
sent to the target Execution function to be exe-
cuted.
7. Figure 3. CPSR Register
Figure 4. Instruction Condition Field
Figure 5. Data Processing Instruction
3.4 Instruction Execution
The main working unit of the simulator con-
sists of the execution functions for each different
type of ARM instruction. These functions do the
actual arithmetic computations, move data be-
tween simulated registers and memory, update the
CPSR register, and keep track of the program
counter and stack pointer.
In addition to the predefined bit pattern of
each instruction type, there are many variable bits
in each instruction. Depending on the state of
these variable bits, each instruction could be exe-
cuted in many different ways. For example, a
Data Processing Instruction has the ‘I’ bit which
determines if the second operand is a register or an
immediate value. If the second operand is a reg-
ister, the instruction also contains a shift field,
which can specify different types of shifts. The
shift amount can either be a register or an immedi-
8. ate value. The OpCode field may specify sixteen
different kinds of operations the Data Processing
instruction may perform. See Figure 5 for details
on Data Processing Instructions.
Another important aspect of WinARM is the
simulation of CPSR (Program Status Register) and
the condition flag of each ARM instruction.
These two, in combination, determine whether the
current decoded instruction should be executed or
ignored, which is of utmost importance when run-
ning branch instructions. The CPSR register has
a four bit Condition Code that consists of N, Z, C
and V flags (see Figure 3). These flags are up-
dated and latched each time any instruction is exe-
cuted with the S bit field set to 1 [2]. Every ARM
instruction contains a Condition field of four bits,
but each individual bit of the instruction condition
field has no direct correlation with each of the
condition flags in the CPSR register. Instead,
there are sixteen possible instruction conditions;
each condition requires the system to check the
state of one or more CPSR condition flags. See
Figure 4 for details on each of the condition field
requirements. If the requirements were met, the
current instruction gets executed, otherwise, it is
ignored and the PC (program counter) gets incre-
mented by one and points to the next instruction to
be executed.
The PC (Program Counter), which is register
r15, points to the next ARM instruction to be exe-
cuted. The value of the PC can be updated or
moved just like any other ARM register, for in-
stance, a branch instruction would update the PC
with its offset so the execution path can jump to
9. somewhere else in the Program Space. In con-
junction with register r14, the link register, the PC
can simulate a return from a called function: the
old PC value is copied into r14 before branching
occurs, upon returning from the called function,
the value in r14 is copied back into the PC, so the
Figure 6. WinARM GUI
PC would point to the instruction before the
branch occurred. The WinARM stack, similar to
the Program Space and memory space, is simu-
lated with an array of type unsigned long. There
are no pop and push methods implemented explic-
itly for the stack. Instead, block data transfer in-
structions stm and ldm are used to simulate stack
pop and push, which updates register r13, the
stack pointer.
3.5 Simulator GUI
A WinARM GUI was built using Microsoft Visual
Basic, which gives WinARM users a more interac-
tive environment to learn about simulators. Users
can type in C code in the Enter C Code text
area.Upon clicking the execute button, the simula-
tor would compile the C code and display the re-
sulting ARM assembly code in the ARM Assem-
bly Code text area. The machine code generated
and the decoded version of the machine code
would be displayed in the Machine Code text area
and the Decoded Instructions text area respectively.
10. The sixteen user registers would also be updated
with their final state. See Figure 6.
4. Future Work
The current version of WinARM has only
simulated the mostly commonly used instruction
types, such as Data Processing, Multiply, Single
and Block Data Transfer and Branch. More work
will be done to simulate the remaining instruction
types. Instruction pipelining also need to be im-
plemented along with clock cycles to make the
simulator more complete. Currently, WinARM
can only handle integer arithmetic, future versions
would also to incorporate floating point arithmetic.
5. Conclusion
The WinARM simulator was developed to
target audiences interested in learning the inner
workings of a processor simulator and to gain
some insight into the ARM architecture. Wi-
nARM uses a traditional fetch-decode-execute
paradigm to execute non-native machine code on a
host processor in favor of execution speed [4].
The fetch-decode-execute phases of the simulator
were built using C for efficiency reasons, and a
GUI built in Microsoft Visual Basic was supplied
so users can see the different steps taken in the
simulation process and the final state of each regis-
ter.
11. References:
[1]funkysh, “Into my ARMs”
www.phrack.org/show.php?p=58&a=10
[2] ARM Architectural Reference Manual – Issue
D, 2000 Advanced RISC Machines LTD
[3] D. A. Sykes, B.A. Malloy, The Design of an
Efficient Simulator for the Pentium Pro Proc-
essor, In Proceedings of the 1996 Winter
Simulation Conference, pp. 840-847, 1996.
[4] I. Barbieri, M. Bariani, M. Raggio, A VLIW
Architecture Simulator Innovative Approach
for HW-SW Co-Design, 2000 IEEE interna-
tional Conference on Multimedia and Expo,
Vol. 3. pp1375-1378, 2000.
[5] B. Clarke, A. Czezowski, P. Strazdins, Imple-
mentation Aspects of a SPARC V9 Complete
Machine Simulator, In Conferences in Re-
search in Information Technology, Vol. 4.
Australian Computer Society, pp. 23-32,
2001.
[6] J. C. Moure, D. I. Rexachs, E. Luque, The
KScalar Simulator, ACM Journal of Educa-
tional Resources in Computing, Vol. 2, No. 1,
pp. 73-116 March, 2002.
[7] B. K. Gunther, Facilitating Learning in Ad-
12. vanced Computer Architecture through Ap-
propriate Simulation, ACSC 23rd Australasian
Computer Science Conference, 2000. pp.
104-112, 1999.
[8] D. Skrien, CPU Sim3.1: A Tool for Simulating
Computer Architectures for Computer Or-
ganization Classes, ACM Journal of Educa-
tional Resources in Computing, Vol. 1, No. 4 ,
pp. 46-59, December, 2001.
[9] F. Menczer, A. M. Segre, OAMulator: A
Teaching Resource to Introduce Computer Ar-
chitecture Concepts, Journal of Educational
Resources in Computing, Vol. 1, No. 4,
pp18-30, December, 2001.
[10] A. R. Shealy, B. A. Malloy, Simx86: An Ex-
tensible Simulator for the Intel 80x86 Proces-
sor Family, In Proceedings of the 30th Annual
Simulation Symposium, pp. 157-166, 1997.