Wednesday, October 30, 2019

Perspective on Conflict, Conflict Interests and Goals, and Coursework

Perspective on Conflict, Conflict Interests and Goals, and Interpersonal Negotiation - Coursework Example Parties enter into conflicts because their objectives are not being met and they want to achieve their goals in all cases. Entering into conflicts is in the interest of no party. It only tends to weaken the integrity of the organization because the overall morale declines. Conflicts should be resolved as soon as possible either at personal level or through the use of mediation strategies. If conflicts remain unresolved, this affects the productivity and job dissatisfaction continues to increase which is harmful for everybody in the long run. It is very crucial that interpersonal negotiation is conducted among the conflicting parties so that they are brought together on a communicative platform where they can work out a solution that acceptable to all parties involved. Interpersonal negotiation requires the mediator to have such skills with which he is able to bring all parties together at equal level so that they can discuss their problems with each other and work toward resolving the

Monday, October 28, 2019

The trade system in Ramayana Essay Example for Free

The trade system in Ramayana Essay Based on the summary by Stephen Knapp (2007) The Ramayana is one of the two greatest stories told from India which was written and created by VÄ lmiki sometime between 4th and 2nd BCE. Knapp had elaborated that the story of Ramayana is about how the lives of people have been running in India on the year 1000 BCE. The story wandered around the life of the heroes of the story, Rama and Sita. The story of the Ramayana has been very influential to the lives and teachings of the Indians at those times, preachers treated the life story of Rama and Sita as a model for the youth (Knapp, 2007).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the story of Ramayana, since it talked about how the people of India lived a long time ago, the source of the primary needs of the people was also mentioned. At the timeline of the story, trading was very active and people have been able to live by the barter system since money was not that used during that period. Within the Ramayana story, there are passages that mentioned things about the trades that happened in the place the story was set (Narayan, 1972).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Most of the merchants at that time had stones, iron, stones and even animals for export. But the most popular product exported by the Indians at that time was cloths which was made of cotton and were perfectly woven and block printed. These items were bartered to other races that intentionally went to the Indian ports to trade different products (Foley, 2004).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The trade of different products between India and other countries also happened inside India itself, Indians bartered with each other to be able to acquire the things each of them needed at that time.   This also occurred in the story of Ramayana, in which the monkeys and the Ravanas are involved (mythome.com, 2004).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The army of monkeys was headed by Hanuman, and they transacted and traded products like cloth and war equipments with the Ravanas, with hope of getting their trust. But their main hidden goal was to defeat them and the kill their leader which is Ravana, the ten-headed evil god (indhistory.com, 2007). References: Ramayana. 2007. 1. Ramayana Summary. 2004. 1. Foley, Jennifer. Lessons of the Indian Epics: Following the Dharma. 2004. Knapp, Stephen. The Ramayana: A Summary by Stephen Knapp. 2007. 1. Narayan, R.K. The Ramayana. Viking Press, 1972.

Saturday, October 26, 2019

A Midsummer Night’s Dream Essay: Importance of the Nighttime Forest

A Midsummer Night's Dream: The Importance of the Nighttime Forest  Ã‚  Ã‚  Ã‚  Ã‚   In Shakespeare’s play A Midsummer Night's Dream the dark forest is the center of the world, relegating Athens, center of the civilized Greek world, to the periphery. Day gives way to night, and mortal rulers leave the stage to be replaced by fairies. The special properties of night in a forest make it the perfect setting for the four lovers to set out on a project of self-discovery. Shakespeare implies that in darkness, reliance on senses other than eyesight leads to true seeing. In A Midsummer Night's Dream, the nighttime forest, by disrupting and transforming vision, forces introspection and improvisation that help the four lovers on their way to self-understanding. The darkness of the night setting seems particularly important in a play (and a culture) where the language of love relies so heavily on sight imagery. Fairy magic literalizes the connection between love and sight: appropriately, Oberon's love juice is applied to the eyes. In the language of the play, to look on or at someone is the most common metonymic expression for falling in love with a new person, or for spending time with the one you already love. Lysander steels himself and Hermia against the trial of separation with a call to "starve our sight / From lover's food till morrow deep midnight" (1.1, ll. 221-2). Vision and hunger together become the elements of Lysander's metaphor about lovers and separation; to see is to be with, and a lover's company is elevated in importance to the need for food and drink. But Hermia and Lysander are not going to see each other by the light of day. The scant light of midnight-midnight, when dawn and dusk are both equally far off-will provide a ll... ..." which connotes shallow feeling (Garber 10/13); the word "dote" is instead reserved for description of his former feelings about Hermia (4.1 ll. 163-73). His feelings for Hermia are the ones that have metaphorically been snuffed out by the dawn, "melted as the snow" before the sun (4.1 l. 163). What began in night as magic, as introspection and improvisation, has in daylight solidified into deep feeling. Although he speaks of Helena being "the object and pleasure" of his eye, the visual metaphor is accompanied by a proclamation of the faith and virtue of his heart's devotion (4.1 ll. 166-7). Introspection allows keener observation; new ways of looking enrich more ordinary types of sight. Night teaches the four lovers how to see more clearly during the day. Works Cited: Shakespeare, William. A Midsummer Night's Dream. New York: Washington Square Press, 1993.

Thursday, October 24, 2019

Wildlife Resources: A Global Account of Economic Use Essay

Earth Wildlife Extinction Introduction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Conservation of wildlife (wild living resources), is important for the development of any nation. The extinction of the wildlife has therefore become the agenda in American and other Nations in dealing with preservation of wildlife. For instance, all but a small handful of countries have national parks. However, the most challenges facing nations today is wildlife extinction. It is no longer about the government and other agencies deciding whether conservation is a good idea, but rather implementing those ideas for the benefit of people locally, regionally and internationally. The following part is an interview with Jean-Christophe, one of Deputy Director of Global wildlife protection Program me (IUCN’s), and who oversees many of diverse regional and global biodiversity. Interview Me:  How do you see this ‘big’ issue of extinction of wildlife? Are they endangered or critically endangered? Is the issue getting worse? Moreover, is it under control or out of control? Jean-Christophe: Despite alarming situation of wildlife extinction globally every year, it appears that the situation is almost not under control. Following report from all groups we have monitored, there is continued decline of species fast towards extinction. What is making me more worried is that the extinction is moving rapidly into list of most endangered species. CK:  I heard about your Red list rankings of the threatened Species category but did not understand how it works. Tell me how it works Jean-Christophe: Okay. Any of threatened species, are put under three categories; Vulnerable, Endangered and lastly Critically Endangered species. For instance, those found in a threatened category, it means that it went not just slow decline but through quite a serious decline. However, it less serious considered to Endangered or Critically Endangered species. On the Red List, species listed as endangered species are just like the â€Å"ice berg† but are of most conservation concern. CK:  Can, and should all species be saved from extinction? If not, which ones ‘must’ be saved? Jean-Christophe:  This is the discussion, many people would like to have in the conservation community; it is what we call triage. People think that some species are useful to people and should be saved; while others not. However, it is not so important trying to have consensus on that question than finding a proper solution to save species. Background information   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Since the beginning of the man, there has been Endangered Wildlife .Four thousand of years, the wild plants, the animals and the ocean creatures have made every inch of earth as their home. With man being exceedingly populated, has dropped the number of wildlife drastically. In the same way, many of species have become. It is notable that animals, water living creatures, and wild plants are becoming rarer in these times. For the last centuries, the extinction was at a slower rate but today, the extinction has quickly risen. Taking United States as an example, in the last 200 years, it has lost many birds as compared to other areas of its comparable size (McGavin, p.23). Causes of wildlife extinction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   According to Evers (p.4), to the question to wildlife extinction, Human beings are held responsible. Through human activities, many of the species have become extinct. The first activity, which is the major reason for extinction, is the interference of natural habitats through deforestation, creation of wetlands and draining of water marshes. In addition, it is evident that cities and towns are converting most grassland. The second major cause of extinction is commercial hunting and poaching. A poacher can be defined as the person who hunts and kills important species for profit. Often times, poachers hunt neither for legalized games nor for food.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Taking example from the current scope, Currently, Lake Malawi (Central Africa) holds over 500 cichlid fish species with 99 % of them endemic. Comparing with other regions, the lake is only one-seventh the size of great lakes in North America’s with just 173 species, less than 11% of which are endemic. In the last 20 years, Western Ecuador is said to have contained around 9,000 to 10,000 plant species, some 60 per cent of them endemic. In addition, given between 15 and 30 animal species, which present for each plant species in similar areas, it is evident that perhaps western Ecuador contained about 200,000 species around 1970.Since then, the western Ecuador forests have been destroyed to pave way for oil wells, banana plantations, and human settlements. Although is difficult to judge, the number of species in this region may have dropped with about 55,000 within the duration. Taking Pantanal in Brazil yet another example, which cont ains about 120,000 square kilometers of wetlands and classified as â€Å"international importance† by UNESCO, it greatly suffers increased earth extinction. This is from dam construction, agricultural expansion and other forms of disruptive development (Kotpal, 46). Major agencies   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All the endangered species are found under the â€Å"Endangered Species Act (ESA).† The act, deals with responsibility of protection of the wildlife worldwide. One of well-known agency is â€Å"Fish and Wildlife Service (FWS).† The major function of the agency is primarily management of species found on land .Another well known agency is the â€Å"National Marine Fisheries Service (NMFS).† The agency protects and manages all the marine species in our seas and oceans. However, there is confusion existing between the two agencies when it comes to protecting species that are found in land and sea. These agencies are also found in each of the Nation worldwide. For instance, In United States, there is â€Å"National Sea Turtle Coordination(NSTC) â€Å" which deals with protection of seven sea turtle species listed as threatened species under the ESA( Kaufman,22). Action plans to save wildlife   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Currently, much is being done according to the conditions in each of the country to help save the endangered species. Considering the Zoos, found in almost all Nations, they help to governments as well as other agencies in protection and preservation of animals and environments. In addition, well remarkable action plan is reduction of deadly diseases and viruses in the wild animals .An example is the SD Zoo, which deals with Virology and Immunology deals with protection of wild animals from deadly viruses and diseases. in the world animal population .Another well known action plan was establishment of the Reproductive Physiology department in United States which deals with study of preservation, semen evaluation, embryo transfer and artificial insemination techniques .Lastly, is the Pathology department, working to determine the cause of many death in animals and action plan to prevent it (Roth,53) Red list   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Any of threatened species, are put under three categories; Vulnerable, Endangered and lastly Critically Endangered species. For instance, those found in a threatened category, it means that it went not just slow decline but through quite a serious decline. However, the rate of decline of threatened species is less serious considered to Endangered or Critically Endangered species. On the Red List, species listed as endangered species are just like the â€Å"ice berg† but are of most conservation concern. Taking red-cockaded as example, it requires the wood that is around sixty – seventy years old to make it a home. In the top of the Red list, freshwater fish species are marked as extinct or being in a state of dangerous incline of about 25% .On the list are birds, which are threatened with extinction as well. Close to the list of animals facing dangerous extinction are bears, rhinos and tigers. The extinction has I most cases being associated with habitat loss. There are 25 most endangered species found on red line, unfortunately, some of these species are already completely .As mentioned earlier, birds are the most endangered species. The following are the most endangered species in Red line top list;waiian Monk Seal, Hawaiian Crow, Kakapo Brazilian ,Merganser Sumatran and Rhinoceros Vaquita Consequences of wildlife extinction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   According to Adams (12), when any of elements is removed from a fragile ecosystem, it has long lasting and far reaching effects on biodiversity. Consider this; from the extinction of wolves, there is no check on numbers on other animals and these results to prey populations grew larger. For instance, when exploding elk populations in U.S wiped out so many riparian plants and willows, songbirds no longer had enough cover or food. This caused their extinction consequently increasing numbers of insects such as mosquito’s. On the other hand, loss of large iconic species such as like the tiger, wolf, and rhino  may make more of stimulating news, more than the extinction of mussels and moths. It is more important to note that even small species, can significantly affect the ecosystems in different ways. Conclusion   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There is high expectation to the protection of wildlife from the action plans, agencies, and the policies in place. For instance, Wildlife crime policies have set, globally objective to the sustainable of wildlife protection and conservation. It is working hard to the spirit of Vision 2030.This is through jeopardizing the wildlife tourism industry. One of the tools that have so far proved most effective is enforcement of wildlife management law. However, more important is not to losing insight to the ultimate point view of resource management in objective of law enforcement. References Adams, William.  Against Extinction: The Story of Conservation. London: Earthscan, 2004. Internet resource Evers, David C.  A Guide to Michigan’s Endangered Wildlife. Ann Arbor: University of Michigan Press, 1992. Print. Kaufman, Les, and Kenneth Mallory.  The Last Extinction. Cambridge, Mass: MIT Press, 1993. Print Kotpal, R L.  Modern Text Book of Zoology Vertebrates: Animal Diversity-Ii. New Delhi: Global Media Publications, 2010. Internet resource. McGavin, George.  Endangered: Wildlife on the Brink of Extinction. Buffalo, N.Y: Firefly Books, 2006. Print Roth, Harald H, and Günter Merz.  Wildlife Resources: A Global Account of Economic Use. Berlin: Springer Verlag, 1996. Print. Source document

Wednesday, October 23, 2019

Why you should eat breakfast

Although this research Is for everyone, It'll help us to be better students as well! Preview Main Points: First I will tell you about the stress relief benefit, then I will tell you about the concentration benefit, last I will tell you about the memory benefit. BODY Transition: Let's bite down on this exciting topic shall we? Main Point 1: As students, we have very busy lives and it can become almost Impossible to Just relax bit. A. In 2009, Dry. Schools and Dry. Smith of the Wrigley Science Institute states that chewing gum can actually relieve stress.B. Stress can be caused by all kinds of forms. When we're caught lying; when we're bout to take a test; when we're worried or even sad. C. When we are stressed, our bodies become tense. A remedy for that would be to exercise. Well, the remedy to loosen our Jaw tension is to chew gum! Dry. Shall posts In 2002 Journal of Oral Rehabilitation that muscle contraction from chewing Is a form of exercise. Chewing stimulates vague nerve In the brain, which lowers heart rate and increases relaxation. D. In addition, Dry. Chou of peoples. Org published an experiment in April 2013 that gum relieves stress not only by producing blood flow and oxygen to the brain, but also by subconsciously shifting our attention to the act of chewing. Transition: Now that our Jaws are loosened up, let's loosen our ears to listen to the next benefit: concentration! Main Point 2: Concentrating on specific things can be difficult especially when we live in such a busy world! In our generation, we have so many things to distract us from our priorities such as school. A.An experiment posted in Nutritional Neuroscience, a Journal updated in 2013 shows that the act of chewing gum increases concentration! B. This chart shows the results for 3 types of experiments based on alertness, contentedness, and calmness. Out of a possible 25 correct answers, the test results were higher when the subjects hewed gum before taking the test as opposed to not chewi ng gum. C. Another test conducted by Dry. Allen et al of Nutritional Neuroscience Journal updated in 2011 and there were fewer long responses in several tests. Transition: Now let's concentrate on advancing our memory!Main Point 3: Memorization can be a tedious task but if we study and then chew gum before having to recall all that we've memorized, we'll be able to do it faster! A. Jennifer Welsh of Live Science cites the Journal Appetite in 2011 that the SST. Lawrence University Research Team conducted an experiment on 224 undergraduates and vided them into 3 groups. The first group chewed gum before and during the test. The second group chewed gum 5 minutes before the test. It. Results showed that chewing gum before the test improved a student's performance. Ii. Within 15-20 minutes, the 5 minute gum chewers recalled 25 to 50 percent more information. That's pretty significant! ‘v. The researchers believe that the improvement in brain power was due to the chewing warming up the brain, a phenomenon they suggestively call the â€Å"mastication-induced arousal† B. Scientific American's author Amy Kraft posted March 2013 about a test conducted n 40 people. Researchers had all 40 people listen to a 30-minute recording of a sequence of numbers. It. 20 people chewed gum while the rest did not. Iii.The results showed that the gum chewers had higher accuracy rates and faster reaction times. ‘v. This is due to more oxygen flow to the brain which is responsible for attention and with more attention means more room for memorization! CONCLUSION Review Topic: I have Just gone over the three wonderful reasons why you should start chewing gum on a regular everyday! Review Main Points: First, we learned the stress-relief benefit, then we learned the incarceration benefit, last we learned the memory benefit. Lasting Thought: We have pretty busy lives! Why You Should Eat Breakfast Topic: Why you should eat breakfast everyday General Purpose: To persuade Specific Purpose: To persuade the class why it is good to eat Thesis Statement: Eating breakfast can make each day so much better. I. Introduction A. Attention Getter: How many of you have heard that breakfast is the most important meal of the day. But still manage to walk out the house without eating breakfast. I bet you don’t forget your caffeine though, B. Reason to Listen: To understand why breakfast is so important. C.Thesis Statement: Eating breakfast can make each day so much better. D. Credibility Statement: Research E. Preview of Main Points: 1. First I will go into the benefits of breakfast 2. Second, I will explain why you should make a priority to eat breakfast everyday 3. Last, I will tell you fun facts. A. Benefits of eating breakfast a. . Skipping breakfast can actually backfire on you, and cause you to gain weight. Going without food increases the production of insulin in your body, which can cause your body to store more fat. . The longer you go without eating, the more glycogen your muscles use, and the less energy you have. c. Depending on age and gender, your body needs a minimum amount of nutritional elements, such as vitamins, minerals, fiber, calories and fat, to keep organs functioning properly. Eating breakfast gives you a jump-start on meeting your nutritional requirements for the day, and also gets you on the path to making more healthy choices. (LIVESTRONG) B. Priority d.Eating breakfast will allow you to focus better and do better in school e. Allow you to carry out your day with more energy. f. When you eat breakfast it allows your portions throughout the day. People who don’t eat breakfast tend to eat more during the day. (HEALTH. ORG) C. Fun Facts g. one in ten people skips breakfast, which can severely limit their ability to learn. h. Research shows that people who eat breakfast have healthier weights than children who skip breakfast and also perform better on memory tests. health 24. com) i. Breakfast is the meal that makes champions II. Conclusion F. Preview of Main Points: 4. First I will go into the benefits of breakfast 5. Second, I will explain why you should make a priority to eat breakfast everyday 6. Last, I will tell you fun facts You have overcome many trials and tribulations to get to this day and I couldn’t be any prouder. a. Everyone should just try and eat breakfast and see the major difference it makes in your day.

Tuesday, October 22, 2019

The eNotes Blog e-Readers Celebration orSacrilege

e-Readers Celebration orSacrilege Some of the hottest gifts this past Christmas were e-readers: Kindles, Nooks, iPhones, and iPads. The industry expected sales of e-texts to soar and they were not disappointed. In fact, the Association of American Publishers reports that sales took a mighty jump, up an estimated 115.8% in the month of January, and generated some $69.9 million in revenue. No other segment of the publishing industry (paperback, trade paper, hardbacks or audiobooks) saw an increase in sales. In fact, sales took a hit in all other sectors. Mass market paperback sales fell by 30.9%, trade paper dropped by 19.7%, and hardbacks by 11.3%. So are traditional books doomed to go the way of quill and parchment? Perhaps. One day. But there is still a lot of love out there for the real book. A very unscientific poll I recently conducted included comments from defenders of traditional texts, some grudging acknowledgment of the plus sides of e-readers, and a few out-and-out converts to new media. Here is a sampling of some of those comments. From My Cold, Dead Hands! Pffft to the e-Readers: Maybe I dont want to read the new version of Alice in Wonderland. I would prefer to read a second edition in old type, weathered pagesa book that took decades to get into my hands. I got a big Shakespeare book from 1864 and it feels great to read. Who cares what the file date is on an electronic file? Give me a real book. After all candles, incense, hot bath, and an e-reader? No. I like my books still. I want to feel the paper. I want to hold the book. Its a sensory experience. If the book makes me cry, I want my teardrop to darken the page and smear the ink. If someone had the book before me, I want to see   notes in the margins, the messages from mothers who gifted the books (before the giftee sold it to Half-Price Books). I, For One, Have Decided to Extend a Hand to Our Electronic Overlords: I have a KindleI use it for my junk food pleasure reads. Theres nothing like a book and I still have, buy, and read tons of them, but theres only so much space and so many bookshelves. The nice thing about the Kindle is the highlighting and notes featuresthe dictionary too, but its fun to reread a book and see what you said on a previous read (you can also save/print, etc., the notes). The free classics are a plus, but the versions are so so. Its also nice when you want instant gratificationlike junk foodyou want it NOW. :) I have a Kindle and I love it for the most part, but I still do read real books. Its really difficult to flip back and forth in the Kindle, which is my only complaint. For instance, Im reading The Joy Luck Club and I keep getting confused about the characters. Since Im reading a real book version, I can easily bookmark the page that lists the characters and also scan through the previous chapters to recall their individual stories. But since we are all book junkies here, the Kindle keeps the clutter down a bit. Ive Seen the Light! And Its the Soft, Sweet Glow of My e-Reader: I like being able to read a lot for very little dough. The savings √+. (The local news) did a story on my sons school and their e-books and the fact that all students are required to have laptops. The story was due to the fact that they had all classes from home during the icy weather. As for the e-books, the big advantage is that they come to life. They have links, animation, easy to navigate, easy to click on a word and it will take you to the glossary definition if it is a vocabulary word to be learned for the section and many other things e-books are quite a worthwhile technological advancement. I bought it to combat clutter crisis. Good to read long novels while standing on public transit. I read most of Wolf Hall on Toronto subways. Where do you stand? We would love to hear your own thoughts about e-readers. If youve bought one, do you like it? Why or why not? If you havent, do you plan to do so?

Monday, October 21, 2019

USS Illinois (BB-65) in World War II

USS Illinois (BB-65) in World War II USS Illinois (BB-65) was a battleship that was laid down during World War II (1939-1945) but never completed. First proposed as a ship of the massive Montana-class of battleship, Illinois was re-ordered in 1940 as the fifth vessel of the US Navys Iowa-class. As work commenced, the US Navy found that it had a more pressing need for aircraft carriers than battleships. This led to efforts to convert Illinois into a carrier. The resulting designs proved impractical and construction resumed on the battleship but at a slow speed. In early August 1945, with Illinois only 22% complete, the US Navy elected to cancel the ship. Some debate ensued regarding completing the hull for use in nuclear testing, but the cost proved prohibitive and the decision was made to break up what had been built. A New Design In early 1938, work commenced on a new battleship design at the request of US Navy General Board head Admiral Thomas C. Hart. At first conceived as a larger version of the earlier  South Dakota-class, the new battleships were to mount twelve 16 guns or nine 18 guns.  As the design was revised, the armament changed to nine 16 guns. In addition, the class anti-aircraft complement underwent several evolutions with the majority of its 1.1 weapons being replaced with 20 mm and 40 mm guns. Funding for the new ships came in May with the approval of the Naval Act of 1938. Designated the  Iowa-class, construction of the lead ship,  USS  Iowa  (BB-61), was assigned to the New York Navy Yard. Laid down in 1940,  Iowa  was to be the first of four battleships in the class. Fast Battleships Though hull numbers BB-65 and BB-66 were originally slated to be the first two ships of the new, larger  Montana-class, the passage of the Two Ocean Navy Act in July 1940 saw them re-designated as two additional  Iowa-class  battleships named USS  Illinois  and USS  Kentucky  respectively. As fast battleships, their 33-knot speed would allow them to serve as escorts for the new  Essex-class  carriers that were joining the fleet.   Unlike the preceding  Iowa-class ships (Iowa,  New Jersey,  Missouri, and  Wisconsin),  Illinois  and  Kentucky  were to employ all-welded construction which reduced weight while increasing hull strength.  Some debate was also given as to whether to retain the heavy armor scheme initially intended for the  Montana-class. Though this would have improved the vessels protection, it would also have greatly extended construction time. As a result, standard  Iowa-class armor was ordered. One adjustment that was made in the design was to alter elements of the armor scheme to improve protection against torpedo attacks.   USS Illinois (BB-65) - Overview Nation:  United StatesType:  BattleshipShipyard:  Philadelphia  Naval ShipyardLaid Down:  December 6, 1942Fate: Scrapped, September 1958 Specifications (Planned) Displacement:  45,000 tonsLength:  887.2 ft.Beam:  108 ft., 2 in.Draft:  28.9  ft.Speed:  33  knotsComplement: 2,788 Armament (Planned) Guns 9 Ãâ€" 16 in./50 cal Mark 7 guns20 Ãâ€" 5 in./38 cal Mark 12 guns80 Ãâ€" 40 mm/56 cal anti-aircraft guns49 Ãâ€" 20 mm/70 cal anti-aircraft cannons Construction The second ship to carry the name USS Illinois, the first being an Illinois-class battleship (BB-7) commissioned in 1901, BB-65 was laid down at the Philadelphia Naval Shipyard on January 15, 1945.  The delay in the start of construction came as a result of the US Navy putting the battleship on hold following the Battles of the Coral Sea and Midway. In the wake of these engagements, the need for additional aircraft carriers became apparent and these types of vessels took priority in American shipyards. As a result, naval architects began exploring plans for converting Illinois and Kentucky (under construction since 1942) into carriers. The finalized conversion plan would have produced two vessels similar in appearance to the Essex-class. In addition to their aircraft complement, they would have carried twelve 5 guns in four twin and four single mounts. Assessing these plans, it was soon determined that the converted battleships aircraft complement would be smaller than the Essex-class and that the construction process would take longer and cost more than was practical.   Due to this, the decision was made to complete both vessels as battleships but very low priority was given to their construction.  Work moved forward on Illinois in early 1945 and continued into the summer.   With victory over Germany and the impending defeat of Japan, the US Navy ordered construction on the battleship to cease on August 11. Struck from the Naval Vessel Registry the next day, some thought was later given to using the vessels hulk as a target for nuclear testing. When the cost of completing the hull to permit this use was determined and concluded to be too high, the decision to break up the vessel on the ways was made. Scrapping of Illinois incomplete hull commenced in September 1958.

Sunday, October 20, 2019

Perfect Custom Essays

Perfect Custom Essays Nowadays, paper writing for college students has proved to be rather a difficult task for most of them. Consequently, this has pushed them to seek essay writing services from various agencies that offer such services. Various factors have contributed to the students turning to custom essay writing companies for help. These factors include lack of adequate material to complete the assignments, others may be non-natives and the English language appears to be difficult to comprehend. Most college students prefer English essay writing from English native speaking individuals. This is because English is their second language, and they would want their work immaculately done. This may seem unethical to some, but it is quite helpful to many as these companies offer templates that assist students in composing their original work. Additionally, these companies offer various services such as thesis writing, research papers, dissertation chapters, course work and reports among others. Proofread ing and editing of previously done work are also services offered by these companies. Subsequently, such services help in avoiding common grammatical errors such as run-on sentences, punctuation mistakes, spelling mistakes, subject verb agreements and other common typos. It also helps in eliminating plagiarism by correct citations where work has been borrowed and paraphrased to represent originality. These companies accomplish all these by employing expert writers who offer excellent and professional English essay writing skills. Some of these professional writers are English language natives while others have English as their second language but still offer excellent services to the clients available.

Saturday, October 19, 2019

Dim Forest Bright Chimps Essay Example | Topics and Well Written Essays - 750 words

Dim Forest Bright Chimps - Essay Example The paper "Dim Forest Bright Chimps" discusses the article of Christophe Boesch and Hedwige Boesch-Achermann. They feel puzzled by the fact that whether these differences are brought upon by genetic factors or climatic changes. The development of the skills of these monkeys seem to have deep implications for the understanding of early human behaviour. The two scientists, Christophe Boesch and Hedwige Boesch-Achermann, have studied a group of chimpanzees in their natural setting to make new discoveries about the theories of evolution. Their long term study conducted on a group of chimpanzees in the Tai National Park, in the Republic of the Ivory Coast sought to discover their primitive instincts in the sense of their food and hunting preferences. Since the chimps are primates and are at a very early stage of evolution compared to humans it is necessary that their behaviour be observed to draw conclusions about physical and biological anthropology of the humans. The topic also illustra tes the way female chimps train their youngsters to acquaint them with coordination skills required to make and utilise tools. All of this may lead to what Darwin was propounding many years ago that humans and chimps are in the same evolutionary line. The authors have referred to the works of Raymond Dart in 1953 who according to them proposed that group hunting and cooperation were key ingredients in the evolution of Homo sapiens. Although other researchers have spoken about the same instincts in the social carnivores like Lions. ... Although other researchers have spoken about the same instincts in the social carnivores like Lions and Wild dogs but the writers of this article are convinced that "that hunting cooperatively and sharing food played a central role in the drama that enabled early hominids, some 1.8 million years ago, to develop the social systems that are so typically human". 4. Did the author address any contrary evidence or the opinions/work of others that run counter the author(s) claims . According to the writers Jane Goddall observed that Gombe chimps boost their success by hunting independently but simultaneously, thereby disorganizing their prey. They have made a very different observation that Tal chimps owe their success to being organized themselves. Also they have referred to the idea that many anthropologists believe that the hunting and behavioural differences between desert and forest chimps are because of climatic changes making the dessert chimps evolve from another line than that of the forest chimps. This notion is not endorsed by the writer because he believes that these differences exist because forest hunting needed different methodology because of the very dense and dimly lit environment. 5. What were the strengths and/or weaknesses of the author(s) argument Whereas it is true that adaptability shapes behaviours of chimps, even those of humans the different genetic code of these chimps cannot be ignored. Even in humans genetics control behaviours and intelligence. So the fact that these monkeys have superior genes cannot be ignored at all. 6. What are your conclusions Do you agree or disagree with the author Why I agree with the authors because the behavioural difference between the two kinds of chimps can be

Friday, October 18, 2019

Almanac Essay Example | Topics and Well Written Essays - 1750 words

Almanac - Essay Example I adore this time of year. Anyway past that, this is likewise a decent time to investigate The Old Farmers Almanac 2015 climate forecasts, and see what Mother Nature may have in store for us. For the winter climate forecasts in 2014-2015, The Old Farmers Almanac focuses to Solar Cycle 24 – which started in 2008 – and predicts temperatures in the following year to be colder than ordinary amid winter, and hotter than typical amid summer. This winter, the focal and eastern United States will see colder than ordinary temperatures, while the western 33% of the nation will encounter above normal temps. Concerning snow, the focal piece of the nation starting from the dakotas to Texas and afterward east through Georgia and South Carolina can expect icy and dry, while the Corn Belt locale will encounter the cool with heavier snowfall. All in all, The Old Farmers Almanac predicts overwhelming snowfall for the upper east piece of the nation, albeit there are additionally parts of New England – western Massachusetts, southern Vermont, New Hampshire and the greater part of Maine – that will be dryer than ordinary. Florida will probably get more precipitati on than typical this winter. Out west, people can expect gentle temperatures and underneath normal snowfall pretty much, in spite of the fact that the western piece of New Mexico down into the western-most parts of Texas could see icy, frigid conditions. Expect above normal temperatures or more normal precipitation in the vast majority of Washington State. Amid summer, we could be in for a hot, dry one here amidst the nation. Expect hot all through the nation, the main two special cases being in the southwest and in the mid-Atlantic states, where in both areas they are anticipating ordinary temperatures. Taking a gander at the guide of The Old Farmers Almanac climate forecasts for summer 2015, it is hard not to

Emergancy Operations plan Essay Example | Topics and Well Written Essays - 750 words

Emergancy Operations plan - Essay Example Most of these provisions often obtain emergency assistance from the local or remote Balancing Authorizes. On the other hand, the Transmission Operator is expected to have an emergency load reduction plan locating all the identified IROLs (Storm, 2001). These Transmission Operator’s plans should include implementations that allow reduction load plans in sufficient time and amount thereby allowing IROL mitigation before collapse or separation of system. A well-articulated emergency operation should ensure that the load reduction plan must be implemented within 30 minutes. It is the responsibility of the Transmission Operator and Balancing Authority to ensure that the emergency operating plans are sufficient to mitigate emerging hazards or emergencies. Therefore, a standard, emergency operating plan must ensure that there is effective communication protocol during emergency mitigations. Additionally, the must ensure that are load reduction quantities to control the action and res olve emergencies with the established NERC timelines. Any emergency operating plan must be reviewed and evaluated after at least three operational years to ensure that the plans is applicable with development of the affected area or region (Joint Commission Resources, Inc., 2004). ... These elements will provide the guideline to what safe operation mitigation measures to follow. The county of San Mateo’s Emergency Plan The County of San Mateo has a well-structured and elaborate emergency operating plan that meets the federal government’s requirements. This plans aim at mitigating or managing any disaster that might occur in the county (Storm, 2001). The County of San Mateo’s local mitigation plan incorporates both the local and regional components. In its emergency operation plan, the County of San Mateo has identified most of its assets that are at risk and they include local roads, schools, water and sewer lines, hospitals, and public facilities (Webster, 2012). In compliance with the disaster planning requirements, the County Of San Mateo local hazard mitigation plan has defined the county’s general disaster mitigation plan in the form of an appendix (Joint Commission Resources, Inc., 2004). Additionally, the County of San Mateo emer gency mitigating general plan allows periodic evaluation; however, the last update proposed to retain its original organizational structure and plan. The County of San Mateo is liable to numerous natural resources including dam failure inundations, tsunamis, wild land fires, earthquakes, floods, and liquefaction. Therefore, the safety of the residents of this county requires a well-articulated disaster management plan or readiness. Relief from disasters is of much greater results than preparing for the disaster itself (Storm, 2001). Notably, the County of San Mateo has well-planned emergency operation plan since the plan is readily identifying the high priority

Thursday, October 17, 2019

A Little Labor Knowledge Could Go a Long Way for HR as Unions Push Essay

A Little Labor Knowledge Could Go a Long Way for HR as Unions Push Into Private Sector - Essay Example 5. Secondary issue(s): The need for organizations to apprise themselves on current labor laws stemmed from the thrust of the National Labor Relations Board to familiarize themselves on the National Labor Relations Act which incorporates rights of the employees both in union and nonunion places. Further, current issues that emerged focusing on social media and â€Å"whether employer crackdowns on its use by employees venting about their job violates the National Labor Relations Act† (Pyrillis, 2011, par. 5). 6. Relationship of primary article discussion to this course (Strategic Planning & Implementation): The article discussed issues pertinent to the need for contemporary organizations to revert to giving significance in the role of industrial relations and labor laws. Upon closer evaluation, the article’s discussion is related in scope to the Strategic Planning and Implementation course in terms of anticipating changes in the external environment and assuming a more pr oactive than a reactive stance. As learned from the module, â€Å"strategic planning is a step by step process with definite objectives and end products that can be implemented and evaluated. Very simply, it is a process by which we look into the future, paint a picture of that future based on current trends, and influence the forces that will affect us† (Ahoy, 1998). 7. ... d to incorporate knowledge of current labor laws and industrial relations in anticipation of future trends that see the increasing importance of these functions in human relations management. In the article written by Lieberman (2010), she stressed that through effective application of strategic planning process, organizational success can be ensured. She enumerated six steps in the strategic planning process, to wit: â€Å"1. Identify the problem; 2. Outlining the process for developing appropriate strategies; 3. Establishing success criteria; 4. Brainstorm, prioritize, and select viable strategies; 5. Articulate clear, measurable action plans; and 6. Define ways to measure progress and success† (Lieberman, 2010, p. 1). As these appears to be a standard planning process, the differentiating factors emerge as the organizations’ ability to design appropriate strategies given the identified problems and in line with their mission and goals. Linking this discourse to the p rimary article, it can be deduced that lessons from stategic planning courses emphasize the need to look into the future so that the design of strategies would incorporate future trends and therefore the proactive stance is effectively implemented. The article written by Powell (1992) aimed to establish the link between strategic planning and financial performance. As averred, various studies have already published findings that enumerate the benefits of strategic planning in terms of directly improving economic value through generation of information; â€Å"it ensures a through consideration of all feasible options, it forces the firm to evaluate its environment, it stimulates new ideas, it increases motivation and commitment, it enhances internal communication and interaction, and it has symbolic value

Human Resources Management Essay Example | Topics and Well Written Essays - 2000 words

Human Resources Management - Essay Example Due to the shift in demand of employees, the countries with fairly flexible wage had transformed into those with low relative wages. Almost 70% of U.S. employees’ demand had shifted in manufacturing industry from less skilled employees to high skilled employees. Globalization had affected the prices of employee wages. Trade flow among countries gave rise to change in demand for employees because the requirement for more employees in profitable sector had increased and these changes in demand led to increase in employees’ wages (Swagel & Slaughter, 1997). The globalization had affected the demand elasticity of employees. The higher receptiveness of employees’ demand had changed the relative cost of employees (Bruno & Et. Al., 2004). Outsourcing and its effect on wages Globalization influences outsourcing and it affects the wages of labor. For example, the following figure shows the relative wages of the employees in US manufacturing industry. Source: (Feenstra, 20 07). From the above graph, it can be viewed that the relative wages was in declining stage from the year 1960 to 1980. The reason for this decline in relative wages of employees is that the globalization had increased the supply of experienced graduate students from different countries and thus the skilled employees were forced to shift into non – production professions (Feenstra, 2007). Outsourcing model The value chain of a company involves works like that of manufacturing of products. The manufacturing activity needs lesser skilled labors and more unskilled labors compared to marketing and research and development activities. For this reason, companies always want to outsource manufacturing activities to other countries where they can find unskilled labor with lower wages. The following figure shows the outsourcing pattern of value chain of a company (Feenstra, 2007). Source: (Feenstra, 2007). Globalization had helped to outsource the production and manufacturing activitie s to be accomplished by unskilled labor force. For this reason, the activities in the left side of A in the above figure are those which are accumulated from overseas countries and activities of right side of B are those which are undertaken in home country. Globalization had liberalized the trade agreement among countries that led to improve the infrastructure of foreign company. The outsourcing leads to accomplish the works of left side of A at abroad. The activities which are performed at home country need more skilled employees. This is the reason for raise in relative wages for skilled employees in home country. On the other hand, the relative wages of foreign country also increased because certain activities between A and B requires more skilled labor than the activities at the left side of A. For this reason the relative demand of skilled employees had increased in foreign country, which led to increase in relative wages of skilled employees in foreign country (Feenstra, 2007 ). Globalization & Competition between Workers Globalization is associated with the process of integrating international market into a single market. It encompasses goods, services, capital, and technology and labor market. The governments of many

Wednesday, October 16, 2019

A Little Labor Knowledge Could Go a Long Way for HR as Unions Push Essay

A Little Labor Knowledge Could Go a Long Way for HR as Unions Push Into Private Sector - Essay Example 5. Secondary issue(s): The need for organizations to apprise themselves on current labor laws stemmed from the thrust of the National Labor Relations Board to familiarize themselves on the National Labor Relations Act which incorporates rights of the employees both in union and nonunion places. Further, current issues that emerged focusing on social media and â€Å"whether employer crackdowns on its use by employees venting about their job violates the National Labor Relations Act† (Pyrillis, 2011, par. 5). 6. Relationship of primary article discussion to this course (Strategic Planning & Implementation): The article discussed issues pertinent to the need for contemporary organizations to revert to giving significance in the role of industrial relations and labor laws. Upon closer evaluation, the article’s discussion is related in scope to the Strategic Planning and Implementation course in terms of anticipating changes in the external environment and assuming a more pr oactive than a reactive stance. As learned from the module, â€Å"strategic planning is a step by step process with definite objectives and end products that can be implemented and evaluated. Very simply, it is a process by which we look into the future, paint a picture of that future based on current trends, and influence the forces that will affect us† (Ahoy, 1998). 7. ... d to incorporate knowledge of current labor laws and industrial relations in anticipation of future trends that see the increasing importance of these functions in human relations management. In the article written by Lieberman (2010), she stressed that through effective application of strategic planning process, organizational success can be ensured. She enumerated six steps in the strategic planning process, to wit: â€Å"1. Identify the problem; 2. Outlining the process for developing appropriate strategies; 3. Establishing success criteria; 4. Brainstorm, prioritize, and select viable strategies; 5. Articulate clear, measurable action plans; and 6. Define ways to measure progress and success† (Lieberman, 2010, p. 1). As these appears to be a standard planning process, the differentiating factors emerge as the organizations’ ability to design appropriate strategies given the identified problems and in line with their mission and goals. Linking this discourse to the p rimary article, it can be deduced that lessons from stategic planning courses emphasize the need to look into the future so that the design of strategies would incorporate future trends and therefore the proactive stance is effectively implemented. The article written by Powell (1992) aimed to establish the link between strategic planning and financial performance. As averred, various studies have already published findings that enumerate the benefits of strategic planning in terms of directly improving economic value through generation of information; â€Å"it ensures a through consideration of all feasible options, it forces the firm to evaluate its environment, it stimulates new ideas, it increases motivation and commitment, it enhances internal communication and interaction, and it has symbolic value

Tuesday, October 15, 2019

Consensual Relationship Agreements Case Study Example | Topics and Well Written Essays - 1500 words

Consensual Relationship Agreements - Case Study Example Some people believe that workplace romantic relationships should be allowed and that employers should never try to inhibit them. Others, on the other hand, believe that these relationships should be inhibited and that the employees should not be allowed to express their feelings and emotions at work because this interferes with proper workplace ethics (Cohen, 2009). Consensual relationship agreement is a process that has been suggested for managing workplace relationships. A consensual relationship agreement is like a relationship contract where two individuals sign an agreement that explicitly reveals their personal and romantic relationships. As they sign the agreement, they agree to be in the relationship willingly and that their relationship will not affect their professionalism in the workplace. Advantages Consensual relationship agreements are extremely useful both to employees and the organization. Having employees sign this kind of agreement will be useful in making sure that any personal relationships in the workplace are well managed (Hellriegel, 2007). Employees will be sure that if the relationship takes a different course that it was meant, they will not be victimized by their partners by being sued for sexual harassment. A consensual relationship agreement will also help the employees to be sober about their professionalism and be able to separate their personal and professional life. Moreover, signing a consensual relationship agreement will be a better way of aiding the employees in having a relationship that they are not ashamed of and that has a better foundation. Consensual relationship agreements are no more of privacy intrusion than a marriage contract, especially considering that there is nothing for employees to be shameful about if their relationship is open and not based on negative foundations such as immorality or cheating other existing spouses. Employees can also benefit from the consensual relationship agreement because it will pro tect them from getting into relationships with people who are not serious about the relationship. All these factors indicate that the workplace will be improved and that the negative effects that come from personal relationships in the workplace will not be a problem. Argument Against Consensual relationship agreements also have negative impacts. For one reason, the use of consensual relationship agreements assumes that the relationships have a starting point. It is not easy to determine when and where a romantic relationship starts so that the parties involved can decide to sign the contract. While the whole idea of consensual relationship agreements is good because it is meant to make the workplace a better place and avoid confusions in the workplace, its implementation can only remain to be elusive. Studies show that employees resent being micromanaged even from a professional point of view, let alone from a personal point of view. Telling employees that they have to sign a contr act or an agreement in order for them to have a personal relationship is not as practical as it is theoretical. The spirit of consensual relationship agreements may be good, but how to implement is the problem. The other issue with consensual relationship agreements is that it fails to consider that relationships are volatile and always shifting. For instance, two people in a

Monday, October 14, 2019

Thinking Styles and Decision Making Essay Example for Free

Thinking Styles and Decision Making Essay Levels of thinking differed from one person to another. Each thinking style is influenced by our mainstream society, how we think and develop perception on the material things happening in the surroundings. There are a lot of thinking styles that came into being since the time of old ancestors to the recent modern developers of our age. There are twenty six thinking styles that was developed but we will concentrate our discussion on the three sub-divided types namely the Sensory focus, People focus, and Task focus. Other thinking styles are used in psychological workshops and research such as analyst thinking style, realist thinking style, idealist, synthesist, pragmatist and spiritually-guided thinking style (An Introduction to Thinking Styles,).   In 1995, original concept for the thinking styles was formulated by Fiona Beddoes-Jones to enhance professional and personal development (Thinking Styles,).   Thinking styles can help in dealing with different types of problems in the workplace, academe, family and relationships. The Three Different Thinking Styles   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Before we proceed it is necessary to define the three levels of thinking styles. Sensory Focus examines things by receiving information through the senses and used the senses to perceive actual events. It is manifested in the visual, auditory, kinaesthetic and digital thinking. Watching, observing and looking pictures, diagrams, and visual imagery are the simple ways of expressing visual thinking while auditory requires the use of words and language, listening and conversing things. Kinaesthetic thinking is expressed through feelings, intuition, emotions, and physical movement and exercise as digital thinking entails the use of data, facts and statistics and the degree of data rationality. On the other hand, People Focus is how people perceived to relate with other people on their direct environment. It is focused on different levels of thinking such as internal and external thinking, self-referenced, altruistic, conforming, challenging, collaborative and competitive thinking. Internal thinking depends on own judgments and decisions and only consider self-knowledge as right and disregards feedback from other people. Some other people tend to dislike their own ideas and are not confident to explore many possible views and usually rely on other people or groups of people to give feedback on certain issues and problems. These people are external thinkers. Moreover, self referenced thinking is an approach of putting their own needs first and disregards the needs of others. In contrast, altruistic thinking involves responding to the needs of others and is willing to extend their help to other people. Conforming thinkers tends to keep away from confrontations and will certainly take a non-challenging methods, in contrast to challenging thinkers who definitely wanted to take confrontations, debates and experiments. Competitive thinkers would like to aspire for competitions and wants to gain victory from their own performance. Persons who wanted duties defined and detailed-oriented are Task Focus thinkers. They are conscious of the details especially in workplace where information is being transmitted through detailed facts and information. The Task Focus thinkers are strategic, creative, logical, options, procedural, towards, troubleshooting, proactive, reactive, simplicity, complexity, sameness, and different thinkers (Ltd., 2005). These thinking styles are distinct from each other but may sometimes closely connected together. Different patterns of these styles are being used as understanding and communicating with other people in surviving the daily response to work and life system. The amount of understanding different types of problems requires thinking styles that may influence critical thinking process. Such mentioned types of styles are good considerations in problem solving and decision making process. Sensory thinking style can help improve relationship with other people in the workplace, school, organizations, friends, and even families. Non-verbal communication somehow helps in understanding different personalities and the way you can approach them when facing a contradiction. Senses can transmit information and analyze things just by looking, observing, listening, feeling, intuitions, and physical movements. By looking at a critical situation using this kind of style, one can already define and identify the drawbacks. Most persons who don’t want confrontations tends to choose sensory focus in delivering and receiving information towards a given situation or crisis within a workplace. While others opted to choose interaction and personal touch to listen and confront problems this is somehow difficult in relating to contradictions with other people. However, it is very effective in most groups of people who are open-minded and problems can be solved instantaneously. Alternatively, task focus is a better way of coping up things since it is focused on goals and targets, detailed information, possibilities and alternatives in solving problems. These type of styles are distinct to each other and generally have an effect on critical thinking process and can possibly help the outcome of the decision making process. The positive upshot makes life more constructive by knowing which style you are most confident and at ease or difficult to cope up with in acknowledging, appreciating, expressing or solving things and difficulties. It brings people together and means more efficiency in duties, constancy in having good health, development of self-being, and gaining more friends and social groups. Reference An Introduction to Thinking Styles [Electronic Version]. Retrieved June 2, 2007 from http://www.earthtym.net/s-general.html. Ltd., T. C. F. C. (2005). Thnking Styles [Electronic Version]. Retrieved June 2, 2007 from http://www.consultingtools.com/media/thinkingstyles.pdf. Thinking Styles [Electronic Version]. Retrieved June 2, 2007 from http://www.cognitivefitness.co.uk/.

Sunday, October 13, 2019

Cultural Identities in China

Cultural Identities in China One of the oldest continuous civilizations in history and the dominant cultural center of East Asia is China, where the place full with flourishing philosophical, political, economic, artistic and scientific traditions. Moreover, China has opened up an intense cultural identity as a widespread civilization. In the last century, China has been struggled on the challenge of smiting a brand new identity in the world of nation-states and re-determines its cultural values in a modern world. The tension between tradition and modernity of Chinese has been turning to Confucius for possible ways to a latter-day social illness that related with commercialization and sudden economic growth inevitably spotlights by China. Chineses are subject to change their conservation and traditional values. In spite of their persuasiveness and persistence, the major Confucian orientations do not give any rise to a rigid, conform and closed system. China generates imperfect harmony but progress problematic. The increase of new modus of social organization and activities implied the new understanding on many of the traditional beliefs and organizational precondition. Overall, cultures will often adapt into their core elements appropriately. Now, the increase of a consumer society has defiance many of the Confucians philosophies. The emergence of a rich consumer class and the increase of prevalent culture has usher in a set of values constantly related with the concept of modern. Industrialization, urbanization, bureaucratization, democratization, universal education, mass-consumption and fast communication celebrates modernity. These ideas have been recruiting into latest Chinese society and become part of the Chinese cultural identity. Hence, Chinese cultural identity consist both traditional modernity. Any traditions must be comprehended as a chosen version of the former filtered from the desires, experience and current concerns. In the early of 20th Century, Chinas modernization project has left an imprint in the values of Chinese culture. Cultural identity in a specific filmic signification can help to lighten the problem of cultural identity have been claims through empirical. The main issue is not certainly attributable to the films Chinese identity, if this matter exists in most developing countries. Chinese characteristics and Chinese identity was actually brings up by the latter Chinese film where grounds the problem on a concrete Chinese soil. The classical Confucian principles were frowned upon the side of human desire and activities which related to money. An identity that has struggled to balance between tradition and modernity in the contest between Confucian moral tradition and mainland Chineses newly-discovered economic freedom in a post socialist society are captures well the indistinct and uneasy cultural identity of contemporary China. The diverse ideas are contend with one another for interpretative legitimacy is known as the subjective process to evaluate the cultural identity in a cinematic text. The exercise of identity identification will involves the allocation of special set of significances and the overture to involve or avoid the capacity diffusion of other significances. Chinas Enculturation Process According to A. Scott Moreau, enculturation can be seen as the learning of a culture through growing up in it. Enculturation is the process that begins from the moment of birth in which cultural rules and pathways, values and dreams, and pattern and regulations of life are set on from one generation to the next. People who live with their own culture will become enculturated as if they internalize their cultural pattern. There were clearly states that every human are born without culture. The cultural will exist as if the children have go through the enculturation process, because the children has internalized or drawn the environment of culture. Thus, the enculturation process will happen without any realization by the children. The children will learn and form their own self according to their own cultural, which this is another process of enculturation known as the active self-conscious process. Moreover, enculturation involves and brings up the indigenization. Christians enculturation believe that Chinese culture actually includes in the leadership and the incarnation of the Church among the circumstances of current social realities, whereby it indicated facing the political situation creatively in a brand new cultural setting. The Chinese once fit by the outliers, they can start to combine Chinese cultures, values, ideals, teachings and orientation of the gospel and church tradition. Chinas Assimilation Process The continuous of dynasties facilitated Chinas boundary firmly southward and the empire was stranded frequently by aggressions and migrations of northern savage. These people were recruited into Chinese culture through a process of assimilation and it was not irregular for the empire to be excluded by a dynasty of non-Chinese origin. Similarly, people who are out from the religion of Buddhism was adjusted and assimilated to Chinese traditions. In the Roman and other empires, assimilation was very less intensive. The cohesiveness and longevity of Chinese Empire are most important condition as the development of the Chinese bureaucracy and the creeping influence of its Confucian ideology everywhere in Chinese society. Confucianism, was originated as it was in the old Chinese traditions, learned from academies and trained in Chinese families, and finally increased by its own positions as the core disciplines of the civil service examinations, penetrated in Chinese society at all standards and shaped the cement that retained it together, during periods of political decomposition or the adjudication dynasty lost the Mandate of Heaven. Chinese culture, especially Confucianism was proved intensely that it radically penetrated in Vietnam, which China predominant for many centuries. Even surrounding countries such as Korea, where Korea was under Chinese predominant for only short time, as well as Japan, which was never be one of the Chinese Empire. In order to enrich their own societies in Chinese culture and institutions voluntarily, the predominant elites of these countries must be part adopted or adjusted in Chinese culture, even as if they against the Chinese political control. For the new era of East Asia today, this cultural legacy has proven and it will continued to be even more lasting than the previous empire that generates it.

Saturday, October 12, 2019

Love And Shakespeare Essay -- essays research papers

Love and Shakespeare The love theme in Shakespeare's Twelfth Night is confusing but at the same time entertaining. The love triangle involving Viola, disguised as Cesario, is in love with Orsino. Orsino is in love with Olivia. Olivia, however, loves Cesario. Orsino tries to woo Olivia with the language of love; however, his many attempts fail because the heart cannot be controlled. Orsino, a man in love with love itself, is on a mission to win the heart of his current object of affection, the Lady Olivia. She, however, has somewhat different plans as she envisions herself married to the lovely Cesario. Shakespeare's beautiful sonnets 18 and 73 describe the changes in season and the passages of time that correlate with the play's main theme and mood. In both sonnets and in the Twelfth Night introduce the issue of the effect of the weather. In Twelfth Night, a stormy sea has shipwrecked a vessel leaving the passengers scattered at sea. Viola, a Sea Captain, and some sailors believe that they are the only survivors of the wreck. The Captain believes that their being saved was only as fate would have it. Viola struggles with what to do with herself in a foreign country with no male companions. She, with the Captain's help, disguises herself as a boy so that she can protect her identity, support herself, and not be taken advantage of. The Captain agrees with her plan and convinces Duke Orsino that Viola, disguised as Cesario, is one of his noblest men. When the play ends, Viola i...

Friday, October 11, 2019

Culture and Health Attitudes

United States and China Health Attitudes PSYC3540 Culture, Ethnicity, and Diversity U05a1 Culture and Health Attitudes Capella University November, 2012 United States and China Health Attitudes Although every culture has different belief of being healthy, they all share the same definition. According to Mastsumoto and Juang (2013) healthy is defined as, â€Å"a state of complete physical, mental, and social well-being not merely the absence of diseases or infirmity† (p. 180). Not only do it takes physically, mentally, and socially well-being but diseases free to be classified as healthy in all cultures.The United States and the China culture share many differences and similarities when it comes to the belief of being healthy. Recently, there was an interview between a twenty-five year old Chinese girl and me. This girl owned her own business. She was born and raised in China but moved to the United States when she turned twenty years old. She told me she learned that China and the United States share many differences and similarities toward being healthy. The Chinese girl told me in the interviewed in China, they mainly believe in the principle of yin and yang to be healthy.According to the Wikipedia Encyclopedia (2012), â€Å"The concept of yin and yang is also applicable to the human body; for example, the upper part of the body and the back are assigned to yang which is cold foods, while the lower parts of the body are believed to have the yin character which is hot foods. Yin and yang characterization also extends to the various body functions, and – more importantly – to disease symptoms (e. g. , cold and heat sensations are assumed to be yin and yang symptoms, respectively). † Yin and yang is what Chinese people use as a balance between good and bad health.They believe that imbalance of yin or yang is what leads to poor health. For example, if a person eats too much of yin, which might be spicy foods, they are told that the yin caused them to have poor health; this person sure drinks some herbal teas to balance him or her back to good health. Although China believes in good health, there are a lot of mental health people there. The Chinese girl also told me that there are a lot of people in China that have mental health problems – over millions. Most of the mental health problems are due to depression.There are a lot of mental health patients in China that attempts suicide. According to Li, Philips, and Cohen (2012), â€Å"More women attempt suicide than men. The most frequent causes of the attempts were interpersonal conflict (87%), psychological problems (33%), and conflict between others that affected the subject (27%)† (para 1). The Chinese girl said the main cause of the women attempting suicide is due to interpersonal conflict, psychological problems, and conflict with the other people. There are no solutions for the mental health problems in China.Not only do they have mental health p roblems but also chronic diseases. China is known to have more chronic diseases than any other diseases. The Chinese girl told me they are known to have a high risk of cardiovascular diseases, chronic respiratory disease, and cancer. Summary chronic diseases now account for an estimated 80% of deaths and 70% of disability adjusted life-years lost in China (Longde, Lingzhi, Fan, Yamin, and Burton, 2005). The chronic diseases death and the disability adjusted life-years lost are very high in China.The chronic diseases are mostly related to high blood pressure and tobacco used. Most of these people that die from chronic diseases are middle-aged people. The Chinese girl talked about how the Chinese uses the yin and yang to diagnosis chronic diseases. She also stated they use herbal to try to cure these chronic diseases. I told the Chinese girl unlike China, the United States also have a theory they use to become healthy. I told her the United States believe in the influence of the biome dical model of health.The biomedical model of health is where the doctors look at parts of the body to figure out what is wrong with the body and fix it (Helman, 1991). An example of biomedical model of health would be a person going to the doctor because he or she is having chest pain. First, the doctor will do an x-ray on the chest. Secondly, the doctor will diagnosis from the x-ray of the person had a chest or a heart attack. Last, the doctor will give the person some medicine to cure his or her chest pain. Mental health is more common in the United States than in China.The Chinese girl stated that she read that over twenty million people in the United State have mental health (Manderscheid and Henderson, 2004); which is more than China. The age of mental health patients in the United States is over 18. Although, in the United Sates, most women suffer from mental health than men, mental is not due to depression of attempt suicide but depression of mood disorders. There is no cure for mental health problems in the United States. Not only is the United States common known for mental health problems but also diseases that lead to death.I told the girl in the interview that the United States three death diseases are heart disease, cancer, and stroke. Heart disease is the first leading death in the United States. Heart disease occurs mostly in men than women; it is mostly in older people (Fang, Kate, and Nora, 2011). Heart diseases are mostly could by smoking and not eating healthy. To cut the heart disease status, a person should exercise, do not smoke or quit smoking, and eat the right foods such as fruits and vegetables. Cancer is the second leading death in the United States.According to Klabunde, Brown, Ballard-Barbash, White, Thompson, Plescia, & King, (2012), â€Å"Each year, approximately 350,000 persons are diagnosed with breast, cervical, or colorectal cancer in the United States, and nearly 100,000 die from these diseases† (para. 1). There are over twenty-five percent of people in the United States diagnosed with cancer. The cause of most cancers is unknown. There is no cure of cancer. Stroke is the third leading death in the United States. Fang, Kate, M. and Mary (2012) stated that over fifty percent of the United States has been diagnosed with a stroke.Stroke is known to be cause by high blood pressure, stress, high cholesterol, and smoke. The cures to be stroke free is to exercise, eat healthy, and do not smoke. In conclusion, the interviewed between the Chinese girl and I was to help realize that there are a lot of differences and similarities of being healthy in each culture. China and the United States have theories of being healthy; they just have different theories – China theory is called yin and yang while the United States theory is called biomedical model of health. Both China and the United States have mental problems; the United States just have more.Another example of the cultures similarities are th ey both have diseases that cause death such as heart disease and cancer. Reference Fang, J. , Kate, M. S. , & Nora, L. K. (2011). Prevalence of coronary heart disease – united states, 2006-2010. (). Atlanta, United States, Atlanta: U. S. Center for Disease Control. Retrieved from http://search. proquest. com/docview/903302820? accountid=27965 Fang, J. , Kate, M. S. , & Mary, G. G. (2012). Prevalence of stroke – united states, 2006-2010. (). Atlanta, United States, Atlanta: U. S. Center for Disease Control. Retrieved from ttp://search. proquest. com/docview/1020131364? accountid=27965 Helman, C. G. (1991). Limits of biomedical explanation. Lancet, 337(8749), 1080. Klabunde, C. N. , PhD. , Brown, M. , Ballard-Barbash, R. , White, M. C. , ScD. , Thompson, T. , Plescia, M. , & King, S. C. , M. D. (2012). Cancer screening – united states, 2010. (). Atlanta, United States, Atlanta: U. S. Center for Disease Control. Retrieved from http://search. proquest. com/docview/9 22348301? accountid=27965 Manderscheid, R. W. , & Henderson, M. J. (2004). Mental health, united states, 2002 executive ummary. Administration and Policy in Mental Health, 32(1), 49-49. Retrieved from http://search. proquest. com/docview/211057805? accountid=27965 Matsumoto, D. , & Juang, L. (2013). Culture and psychology (5th ed. ). Belmont, CA: Wadsworth Cengage Learning. Li, X. , Phillips, M. R. , & Cohen, A. (2012). Indepth interviews with 244 female suicide attempters and their associates in northern china: Understanding the process and causes of the attempt. Crisis: The Journal Of Crisis Intervention And Suicide Prevention, 33(2), 66-72. doi:10. 1027/0227-5910/a000108Longde, W. , Lingzhi, K. , Fan, W. , Yamin, B. , & Burton, R. (2005). Preventing chronic diseases in China. Lancet, 366(9499), 1821-1824. doi:10. 1016/S0140-6736(05)67344-8 Traditional Chinese medicine. (2012). In Wikipedia. The Free Encyclopedia. Retrieved November 8, 2012, from http://en. wikipedia. org/w/index. php? title= Traditional_ Chinese_medicine&oldid=521839625 Zheng, S. , Song, M. , Wu, L. , Yang, S. , Shen, J. , Lu, X. & Wang, W. (2010). China: Public health genomics. Public Health Genomics, 13(5), 269-275. doi: http://dx. doi. org/10. 1159/000240969

Thursday, October 10, 2019

Competitive vs Collaborative Essay

This is when members of the group are preoccupied in establishing that they are â€Å"right† [AWJ2]and that the others are â€Å"wrong.† The group member may not want to adapt any of their work to have it blend with the others. They may pressure others into thinking their way. Some groups may suffer â€Å"group think,† where a bad choice goes unquestioned because group members are unwilling to go against what appears to be a consensus. Solution: Separate the tasks so that there is little or no overlap of topics. Make sure that each person clearly perceives that there exists a clear reward for the effort expended in the group work. Group members should keep in mind to compromise when coming to agreements because not everyone will always agree. Group member leaves the class. A team member could potentially drop the class because either they just don’t want to take it anymore or because a family issue, or for other reasons. If this occurs after research section assignments, this leaves the group vulnerable without that section. If it was far enough along in the timeline, it would be very difficult to cope with problem because the group would have to start from scratch to complete the remaining sections and assignments. Solution: If the group has not heard from a team member all week, they should message that particular person to ask them about the assignments. If the team still does not hear from them, they should write an email to the professor inquiring about the other team member to find out if they dropped the class for any particular reason. If the team member has dropped the class or refuses participation, the group should divide the remaining sections and tasks to complete the project in a timely manner. Depending on the situation, the team should contact the professor for an extension or guidance for the particular case. Consequences: The obvious penalty for lack of communication and cooperation in group work would be a lower grade or even failure to complete the project. Overcoming obstacles like these in group projects is crucial to actively use and improve communication skills and to build teamwork experience used in the classroom as well as the workplace. Individual’s effort towards group work shows one’s ability to contribute meaningful information and skills to the worth of the total project. Although team members receive grades based on individual efforts, the project grade is collaborative at first. Each team member’s role and effort affects the initial group’s grade. In APA style, quotation marks are reserved for directly quoted materials. Never use quotes to set off a word or phrase. APA style does allow for the use of italics where terms might be new or confusing. None of the words in your check point are new or confusing or might be confusing to your reader so there’re is no reason to use quotes or italics.

Central Processing Unit and Memory Location

MICROPROCESSOR 8085 †¢ Reference Book: – Ramesh S. Goankar, â€Å"Microprocessor Architecture, Programming and Applications with 8085†, 5th Edition, Prentice Hall †¢ Week 1 – Basic Concept and Ideas about Microprocessor. †¢ Week 2 – Architecture of 8085 †¢ Week 3 – Addressing Modes and Instruction set of 8085 †¢ Week 4 – Interrupts of 8085 †¢ Week 5 onwards – Peripherals. Basic Concepts of Microprocessors †¢ Differences between: – Microcomputer – a computer with a microprocessor as its CPU. Includes memory, I/O etc. Microprocessor – silicon chip which includes ALU, register circuits & control circuits – Microcontroller – silicon chip which includes microprocessor, memory & I/O in a single package. What is a Microprocessor? †¢ The word comes from the combination micro and processor. – Processor means a device that processes whatever. In this context proces sor means a device that processes numbers, specifically binary numbers, 0’s and 1’s. †¢ To process means to manipulate. It is a general term that describes all manipulation. Again in this content, it means to perform certain operations on the numbers that depend on the microprocessor’s design.What about micro? †¢ Micro is a new addition. – In the late 1960’s, processors were built using discrete elements. †¢ These devices performed the required operation, but were too large and too slow. – In the early 1970’s the microchip was invented. All of the components that made up the processor were now placed on a single piece of silicon. The size became several thousand times smaller and the speed became several hundred times faster. The â€Å"Micro†Processor was born. Was there ever a â€Å"mini†processor? †¢ No. – It went directly from discrete elements to a single chip. However, omparing todayâ€⠄¢s microprocessors to the ones built in the early 1970’s you find an extreme increase in the amount of integration. †¢ So, What is a microprocessor? Definition of the Microprocessor The microprocessor is a programmable device that takes in numbers, performs on them arithmetic or logical operations according to the program stored in memory and then produces other numbers as a result. Definition (Contd. ) †¢ Lets expand each of the underlined words: – Programmable device: The microprocessor can perform different sets of operations on the data it receives depending on the sequence of instructions supplied in the given program.By changing the program, the microprocessor manipulates the data in different ways. – Instructions: Each microprocessor is designed to execute a specific group of operations. This group of operations is called an instruction set. This instruction set defines what the microprocessor can and cannot do. Definition (Contd. ) – Ta kes in: The data that the microprocessor manipulates must come from somewhere. †¢ It comes from what is called â€Å"input devices†. †¢ These are devices that bring data into the system from the outside world. †¢ These represent devices such as a keyboard, a mouse, switches, and the like.Definition (Contd. ) – Numbers: The microprocessor has a very narrow view on life. It only understands binary numbers. A binary digit is called a bit (which comes from binary digit). The microprocessor recognizes and processes a group of bits together. This group of bits is called a â€Å"word†. The number of bits in a Microprocessor’s word, is a measure of its â€Å"abilities†. Definition (Contd. ) – Words, Bytes, etc. †¢ The earliest microprocessor (the Intel 8088 and Motorola’s 6800) recognized 8-bit words. – They processed information 8-bits at a time. That’s why they are called â€Å"8-bit processors†.They can handle large numbers, but in order to process these numbers, they broke them into 8-bit pieces and processed each group of 8-bits separately. †¢ Later microprocessors (8086 and 68000) were designed with 16-bit words. – A group of 8-bits were referred to as a â€Å"half-word† or â€Å"byte†. – A group of 4 bits is called a â€Å"nibble†. – Also, 32 bit groups were given the name â€Å"long word†. †¢ Today, all processors manipulate at least 32 bits at a time and there exists microprocessors that can process 64, 80, 128 bits Definition (Contd. ) – Arithmetic and Logic Operations: Every microprocessor has arithmetic operations such as add and subtract as part of its instruction set. – Most microprocessors will have operations such as multiply and divide. – Some of the newer ones will have complex operations such as square root. †¢ In addition, microprocessors have logic operations as well. Such as AND, OR, XOR, shift left, shift right, etc. †¢ Again, the number and types of operations define the microprocessor’s instruction set and depends on the specific microprocessor. Definition (Contd. ) – Stored in memory : †¢ First, what is memory? – Memory is the location where information is kept while not in current use. Memory is a collection of storage devices. Usually, each storage device holds one bit. Also, in most kinds of memory, these storage devices are grouped into groups of 8. These 8 storage locations can only be accessed together. So, one can only read or write in terms of bytes to and form memory. – Memory is usually measured by the number of bytes it can hold. It is measured in Kilos, Megas and lately Gigas. A Kilo in computer language is 210 =1024. So, a KB (KiloByte) is 1024 bytes. Mega is 1024 Kilos and Giga is 1024 Mega. Definition (Contd. ) – Stored in memory: †¢ When a program is entered into a computer, it is st ored in memory.Then as the microprocessor starts to execute the instructions, it brings the instructions from memory one at a time. †¢ Memory is also used to hold the data. – The microprocessor reads (brings in) the data from memory when it needs it and writes (stores) the results into memory when it is done. Definition (Contd. ) – Produces: For the user to see the result of the execution of the program, the results must be presented in a human readable form. †¢ The results must be presented on an output device. †¢ This can be the monitor, a paper from the printer, a simple LED or many other forms. A Microprocessor-based systemFrom the above description, we can draw the following block diagram to represent a microprocessor-based system: Input Output Memory Inside The Microprocessor †¢ Internally, the microprocessor is made up of 3 main units. – The Arithmetic/Logic Unit (ALU) – The Control Unit. – An array of registers for holdi ng data while it is being manipulated. Organization of a microprocessorbased system †¢ Let’s expand the picture a bit. I/O Input / Output ALU Register Array System Bus Memory ROM RAM Control Memory †¢ Memory stores information such as instructions and data in binary format (0 and 1).It provides this information to the microprocessor whenever it is needed. †¢ Usually, there is a memory â€Å"sub-system† in a microprocessor-based system. This sub-system includes: – The registers inside the microprocessor – Read Only Memory (ROM) †¢ used to store information that does not change. – Random Access Memory (RAM) (also known as Read/Write Memory). †¢ used to store information supplied by the user. Such as programs and data. Memory Map and Addresses †¢ The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 000 0000 EPROM 3FFF 4400 Address Range of EPROM Chip Address Range RAM 1 RAM 2 RAM 3 Address Range of 1st RAM Chip 5FFF 6000 Address Range of 2nd RAM Chip 8FFF 9000 A3FF A400 Address Range of 3rd RAM Chip RAM 4 F7FF FFFF Address Range of 4th RAM Chip Memory †¢ To execute a program: – the user enters its instructions in binary format into the memory. – The microprocessor then reads these instructions and whatever data is needed from memory, executes the instructions and places the results either in memory or produces it on an output device. The three cycle instruction execution model To execute a program, the microprocessor â€Å"reads† each instruction from memory, â€Å"interprets† it, then â€Å"executes† it. †¢ To use the right names for the cycles: – The microprocessor fetches each instruction, – decodes it, – Then executes it. †¢ This sequence is continued until all instructions are performed. Machine Language †¢ The number of bits tha t form the â€Å"word† of a microprocessor is fixed for that particular processor. – These bits define a maximum number of combinations. †¢ For example an 8-bit microprocessor can have at most 28 = 256 different combinations. However, in most microprocessors, not all of these combinations are used. – Certain patterns are chosen and assigned specific meanings. – Each of these patterns forms an instruction for the microprocessor. – The complete set of patterns makes up the microprocessor’s machine language. The 8085 Machine Language †¢ The 8085 (from Intel) is an 8-bit microprocessor. – The 8085 uses a total of 246 bit patterns to form its instruction set. – These 246 patterns represent only 74 instructions. †¢ The reason for the difference is that some (actually most) instructions have multiple different formats. Because it is very difficult to enter the bit patterns correctly, they are usually entered in hexadeci mal instead of binary. †¢ For example, the combination 0011 1100 which translates into â€Å"increment the number in the register called the accumulator†, is usually entered as 3C. Assembly Language †¢ Entering the instructions using hexadecimal is quite easier than entering the binary combinations. – However, it still is difficult to understand what a program written in hexadecimal does. – So, each company defines a symbolic code for the instructions. – These codes are called â€Å"mnemonics†. The mnemonic for each instruction is usually a group of letters that suggest the operation performed. Assembly Language †¢ Using the same example from before, – 00111100 translates to 3C in hexadecimal (OPCODE) – Its mnemonic is: â€Å"INR A†. – INR stands for â€Å"increment register† and A is short for accumulator. †¢ Another example is: 1000 0000, – Which translates to 80 in hexadecimal. â€⠀œ Its mnemonic is â€Å"ADD B†. – â€Å"Add register B to the accumulator and keep the result in the accumulator†. Assembly Language †¢ It is important to remember that a machine language and its associated assembly language are completely machine dependent. In other words, they are not transferable from one microprocessor to a different one. †¢ For example, Motorolla has an 8-bit microprocessor called the 6800. – The 8085 machine language is very different from that of the 6800. So is the assembly language. – A program written for the 8085 cannot be executed on the 6800 and vice versa. â€Å"Assembling† The Program †¢ How does assembly language get translated into machine language? – There are two ways: – 1st there is â€Å"hand assembly†. †¢ The programmer translates each assembly language instruction into its equivalent hexadecimal code (machine language).Then the hexadecimal code is entered into memory. – The other possibility is a program called an â€Å"assembler†, which does the translation automatically. 8085 Microprocessor Architecture †¢ †¢ †¢ †¢ †¢ †¢ 8-bit general purpose  µp Capable of addressing 64 k of memory Has 40 pins Requires +5 v power supply Can operate with 3 MHz clock 8085 upward compatible Pins Power Supply: +5 V Frequency Generator is connected to those pins Input/Output/ Memory Read Write Multiplexed Address Data Bus Address latch Enable Address Bus †¢ System Bus – wires connecting memory & I/O to microprocessor – Address Bus Unidirectional †¢ Identifying peripheral or memory location – Data Bus †¢ Bidirectional †¢ Transferring data – Control Bus †¢ Synchronization signals †¢ Timing signals †¢ Control signal Architecture of Intel 8085 Microprocessor Intel 8085 Microprocessor †¢ Microprocessor consists of: – – – – – Control unit: control microprocessor operations. ALU: performs data processing function. Registers: provide storage internal to CPU. Interrupts Internal data bus The ALU †¢ In addition to the arithmetic & logic circuits, the ALU includes the accumulator, which is part of every arithmetic & logic operation. Also, the ALU includes a temporary register used for holding data temporarily during the execution of the operation. This temporary register is not accessible by the programmer. †¢ Registers – General Purpose Registers †¢ B, C, D, E, H & L (8 bit registers) †¢ Can be used singly †¢ Or can be used as 16 bit register pairs – BC, DE, HL †¢ H & L can be used as a data pointer (holds memory address) – Special Purpose Registers †¢ Accumulator (8 bit register) – Store 8 bit data – Store the result of an operation – Store 8 bit data during I/O transfer Accumulator Flags B C D E H L Program Counter Stack Pointer Address 6 8 Data †¢ Flag Register – 8 bit register – shows the status of the microprocessor before/after an operation – S (sign flag), Z (zero flag), AC (auxillary carry flag), P (parity flag) & CY (carry flag) D7 S D6 Z D5 X D4 AC D3 X D2 P D1 X D0 CY – Sign Flag †¢ Used for indicating the sign of the data in the accumulator †¢ The sign flag is set if negative (1 – negative) †¢ The sign flag is reset if positive (0 –positive) †¢ Zero Flag – Is set if result obtained after an operation is 0 – Is set following an increment or decrement operation of that register 10110011 + 01001101 ————–1 00000000 †¢ Carry Flag Is set if there is a carry or borrow from arithmetic operation 1011 0101 + 0110 1100 ————–Carry 1 0010 0001 1011 0101 – 1100 1100 ————–Borrow 1 1110 1001 †¢ Auxillary Carry Flag – Is set if there is a carry out of bit 3 †¢ Parity Flag – Is set if parity is even – Is cleared if parity is odd The Internal Architecture †¢ We have already discussed the general purpose registers, the Accumulator, and the flags. †¢ The Program Counter (PC) – This is a register that is used to control the sequencing of the execution of instructions. – This register always holds the address of the next instruction. Since it holds an address, it must be 16 bits wide. The Internal Architecture †¢ The Stack pointer – The stack pointer is also a 16-bit register that is used to point into memory. – The memory this register points to is a special area called the stack. – The stack is an area of memory used to hold data that will be retreived soon. – The stack is usually accessed in a Last In First Out (LIFO) fashion. Non Programmable Registers †¢ Instruction Register & Decoder – Inst ruction is stored in IR after fetched by processor – Decoder decodes instruction in IR Internal Clock generator – 3. 125 MHz internally – 6. 5 MHz externally The Address and Data Busses †¢ The address bus has 8 signal lines A8 – A15 which are unidirectional. †¢ The other 8 address bits are multiplexed (time shared) with the 8 data bits. – So, the bits AD0 – AD7 are bi-directional and serve as A0 – A7 and D0 – D7 at the same time. †¢ During the execution of the instruction, these lines carry the address bits during the early part, then during the late parts of the execution, they carry the 8 data bits. – In order to separate the address from the data, we can use a latch to save the value before the function of the bits changes. Demultiplexing AD7-AD0 From the above description, it becomes obvious that the AD7– AD0 lines are serving a dual purpose and that they need to be demultiplexed to get all the information. – The high order bits of the address remain on the bus for three clock periods. However, the low order bits remain for only one clock period and they would be lost if they are not saved externally. Also, notice that the low order bits of the address disappear when they are needed most. – To make sure we have the entire address for the full three clock cycles, we will use an external latch to save the value of AD7– AD0 when it is carrying the address bits.We use the ALE signal to enable this latch. Demultiplexing AD7-AD0 8085 A15-A8 ALE AD7-AD0 Latch A7- A0 D7- D0 – Given that ALE operates as a pulse during T1, we will be able to latch the address. Then when ALE goes low, the address is saved and the AD7– AD0 lines can be used for their purpose as the bi-directional data lines. Demultiplexing the Bus AD7 – AD0 †¢ †¢ †¢ †¢ The high order address is placed on the address bus and hold for 3 clk periods, The low o rder address is lost after the first clk period, this address needs to be hold however we need to use latch The address AD7 – AD0 is connected as inputs to the latch 74LS373.The ALE signal is connected to the enable (G) pin of the latch and the OC – Output control – of the latch is grounded The Overall Picture †¢ Putting all of the concepts together, we get: A15- A10 Chip Selection Circuit 8085 A15-A8 ALE AD7-AD0 Latch CS A9- A0 A7- A0 1K Byte Memory Chip WR RD IO/M D7- D0 RD WR Introduction to 8085 Instructions The 8085 Instructions – Since the 8085 is an 8-bit device it can have up to 28 (256) instructions. †¢ However, the 8085 only uses 246 combinations that represent a total of 74 instructions. – Most of the instructions have more than one format. These instructions can be grouped into five different groups: †¢ †¢ †¢ †¢ †¢ Data Transfer Operations Arithmetic Operations Logic Operations Branch Operations Machin e Control Operations Instruction and Data Formats †¢ Each instruction has two parts. – The first part is the task or operation to be performed. †¢ This part is called the â€Å"opcode† (operation code). – The second part is the data to be operated on †¢ Called the â€Å"operand†. Data Transfer Operations – These operations simply COPY the data from the source to the destination. – MOV, MVI, LDA, and STA – They transfer: †¢ †¢ †¢ †¢ Data between registers.Data Byte to a register or memory location. Data between a memory location and a register. Data between an IO Device and the accumulator. – The data in the source is not changed. The LXI instruction †¢ The 8085 provides an instruction to place the 16-bit data into the register pair in one step. †¢ LXI Rp, (Load eXtended Immediate) – The instruction LXI B 4000H will place the 16-bit number 4000 into the register pair B, C. â₠¬ ¢ The upper two digits are placed in the 1st register of the pair and the lower two digits in the 2nd . B 40 00 C LXI B 40 00H The Memory â€Å"Register† Most of the instructions of the 8085 can use a memory location in place of a register. – The memory location will become the â€Å"memory† register M. †¢ MOV M B – copy the data from register B into a memory location. – Which memory location? †¢ The memory location is identified by the contents of the HL register pair. – The 16-bit contents of the HL register pair are treated as a 16-bit address and used to identify the memory location. Using the Other Register Pairs – There is also an instruction for moving data from memory to the accumulator without disturbing the contents of the H and L register. †¢ LDAX Rp (LoaD Accumulator eXtended) Copy the 8-bit contents of the memory location identified by the Rp register pair into the Accumulator. – This instruction o nly uses the BC or DE pair. – It does not accept the HL pair. Indirect Addressing Mode †¢ Using data in memory directly (without loading first into a Microprocessor’s register) is called Indirect Addressing. †¢ Indirect addressing uses the data in a register pair as a 16-bit address to identify the memory location being accessed. – The HL register pair is always used in conjunction with the memory register â€Å"M†. – The BC and DE register pairs can be used to load data into the Accumultor using indirect addressing.Arithmetic Operations – Addition (ADD, ADI): – Any 8-bit number. – The contents of a register. – The contents of a memory location. †¢ Can be added to the contents of the accumulator and the result is stored in the accumulator. – Subtraction (SUB, SUI): – Any 8-bit number – The contents of a register – The contents of a memory location †¢ Can be subtracted from the contents of the accumulator. The result is stored in the accumulator. Arithmetic Operations Related to Memory †¢ These instructions perform an arithmetic operation using the contents of a memory location while they are still in memory. ADD – SUB – INR M M M / DCR M †¢ Add the contents of M to the Accumulator †¢ Sub the contents of M from the Accumulator †¢ Increment/decrement the contents of the memory location in place. – All of these use the contents of the HL register pair to identify the memory location being used. Arithmetic Operations – Increment (INR) and Decrement (DCR): †¢ The 8-bit contents of any memory location or any register can be directly incremented or decremented by 1. †¢ No need to disturb the contents of the accumulator. Manipulating Addresses †¢ Now that we have a 16-bit address in a register pair, how do we manipulate it? It is possible to manipulate a 16-bit address stored in a register pair as one entity using some special instructions. †¢ INX Rp †¢ DCX Rp (Increment the 16-bit number in the register pair) (Decrement the 16-bit number in the register pair) – The register pair is incremented or decremented as one entity. No need to worry about a carry from the lower 8-bits to the upper. It is taken care of automatically. Logic Operations †¢ These instructions perform logic operations on the contents of the accumulator. – ANA, ANI, ORA, ORI, XRA and XRI †¢ Source: Accumulator and – An 8-bit number – The contents of a register – The contents of a memory location Destination: Accumulator ANA R/M ANI # ORA ORI XRA XRI R/M # R/M # AND Accumulator With Reg/Mem AND Accumulator With an 8-bit number OR Accumulator With Reg/Mem OR Accumulator With an 8-bit number XOR Accumulator With Reg/Mem XOR Accumulator With an 8-bit number Logic Operations – Complement: †¢ 1’s complement of the contents of the accumulato r. CMA No operand Additional Logic Operations †¢ Rotate – Rotate the contents of the accumulator one position to the left or right. – RLC – RAL – RRC – RAR Rotate the accumulator left. Bit 7 goes to bit 0 AND the Carry flag. Rotate the accumulator left through the carry.Bit 7 goes to the carry and carry goes to bit 0. Rotate the accumulator right. Bit 0 goes to bit 7 AND the Carry flag. Rotate the accumulator right through the carry. Bit 0 goes to the carry and carry goes to bit 7. RLC vs. RLA Carry Flag †¢ RLC 7 6 5 4 3 2 1 0 Accumulator Carry Flag †¢ RAL 7 6 5 4 3 2 1 0 Accumulator Logical Operations †¢ Compare †¢ Compare the contents of a register or memory location with the contents of the accumulator. – CMP R/M Compare the contents of the register or memory location to the contents of the accumulator. Compare the 8-bit number to the contents of the accumulator. CPI # †¢ The compare instruction sets the flag s (Z, Cy, and S). †¢ The compare is done using an internal subtraction that does not change the contents of the accumulator. A – (R / M / #) Branch Operations †¢ Two types: – Unconditional branch. †¢ Go to a new location no matter what. – Conditional branch. †¢ Go to a new location if the condition is true. Unconditional Branch – JMP Address †¢ Jump to the address specified (Go to). – CALL Address †¢ Jump to the address specified but treat it as a subroutine. – RET †¢ Return from a subroutine. – The addresses supplied to all branch operations must be 16-bits.Conditional Branch – Go to new location if a specified condition is met. †¢ JZ Address (Jump on Zero) – Go to address specified if the Zero flag is set. †¢ JNZ Address (Jump on NOT Zero) – Go to address specified if the Zero flag is not set. †¢ JC Address (Jump on Carry) – Go to the address specified if the Carry flag is set. †¢ JNC Address (Jump on No Carry) – Go to the address specified if the Carry flag is not set. †¢ JP †¢ JM Address (Jump on Plus) Address (Jump on Minus) – Go to the address specified if the Sign flag is not set – Go to the address specified if the Sign flag is set.Machine Control – HLT †¢ Stop executing the program. – NOP †¢ No operation †¢ Exactly as it says, do nothing. †¢ Usually used for delay or to replace instructions during debugging. Operand Types †¢ There are different ways for specifying the operand: – There may not be an operand (implied operand) †¢ CMA – The operand may be an 8-bit number (immediate data) †¢ ADI 4FH – The operand may be an internal register (register) †¢ SUB B – The operand may be a 16-bit address (memory address) †¢ LDA 4000H Instruction Size †¢ Depending on the operand type, the instruction may have diff erent sizes.It will occupy a different number of memory bytes. – Typically, all instructions occupy one byte only. – The exception is any instruction that contains immediate data or a memory address. †¢ Instructions that include immediate data use two bytes. – One for the opcode and the other for the 8-bit data. †¢ Instructions that include a memory address occupy three bytes. – One for the opcode, and the other two for the 16-bit address. Instruction with Immediate Date †¢ Operation: Load an 8-bit number into the accumulator. – MVI A, 32 †¢ Operation: MVI A †¢ Operand: The number 32 †¢ Binary Code: 0011 1110 3E 1st byte. 011 0010 32 2nd byte. Instruction with a Memory Address †¢ Operation: go to address 2085. – Instruction: JMP 2085 †¢ Opcode: JMP †¢ Operand: 2085 †¢ Binary code: 1100 0011 C3 1000 0101 85 0010 0000 20 1st byte. 2nd byte 3rd byte Addressing Modes †¢ The microprocessor ha s different ways of specifying the data for the instruction. These are called â€Å"addressing modes†. †¢ The 8085 has four addressing modes: – – – – Implied Immediate Direct Indirect CMA MVI B, 45 LDA 4000 LDAX B †¢ Load the accumulator with the contents of the memory location whose address is stored in the register pair BC). Data Formats In an 8-bit microprocessor, data can be represented in one of four formats: †¢ †¢ †¢ †¢ ASCII BCD Signed Integer Unsigned Integer. – It is important to recognize that the microprocessor deals with 0’s and 1’s. †¢ It deals with values as strings of bits. †¢ It is the job of the user to add a meaning to these strings. Data Formats †¢ Assume the accumulator contains the following value: 0100 0001. – There are four ways of reading this value: †¢ It is an unsigned integer expressed in binary, the equivalent decimal number would be 65. †¢ It is a number expressed in BCD (Binary Coded Decimal) format. That would make it, 41. It is an ASCII representation of a letter. That would make it the letter A. †¢ It is a string of 0’s and 1’s where the 0th and the 6th bits are set to 1 while all other bits are set to 0. ASCII stands for American Standard Code for Information Interchange. Counters & Time Delays Counters †¢ A loop counter is set up by loading a register with a certain value †¢ Then using the DCR (to decrement) and INR (to increment) the contents of the register are updated. †¢ A loop is set up with a conditional jump instruction that loops back or not depending on whether the count has reached the termination count.Counters †¢ The operation of a loop counter can be described using the following flowchart. Initialize Body of loop Update the count No Is this Final Count? Yes Sample ALP for implementing a loop Using DCR instruction MVI C, 15H LOOP DCR C JNZ LOOP Using a Regist er Pair as a Loop Counter †¢ Using a single register, one can repeat a loop for a maximum count of 255 times. †¢ It is possible to increase this count by using a register pair for the loop counter instead of the single register. – A minor problem arises in how to test for the final count since DCX and INX do not modify the flags. However, if the loop is looking for when the count becomes zero, we can use a small trick by ORing the two registers in the pair and then checking the zero flag. Using a Register Pair as a Loop Counter †¢ The following is an example of a loop set up with a register pair as the loop counter. LXI B, 1000H LOOP DCX B MOV A, C ORA B JNZ LOOP Delays †¢ It was shown in Chapter 2 that each instruction passes through different combinations of Fetch, Memory Read, and Memory Write cycles. †¢ Knowing the combinations of cycles, one can calculate how long such an instruction would require to complete. The table in Appendix F of the book contains a column with the title B/M/T. – B for Number of Bytes – M for Number of Machine Cycles – T for Number of T-State. Delays †¢ Knowing how many T-States an instruction requires, and keeping in mind that a T-State is one clock cycle long, we can calculate the time using the following formula: Delay = No. of T-States / Frequency †¢ For example a â€Å"MVI† instruction uses 7 T-States. Therefore, if the Microprocessor is running at 2 MHz, the instruction would require 3. 5  µSeconds to complete. Delay loops †¢ We can use a loop to produce a certain amount of time delay in a program. The following is an example of a delay loop: MVI C, FFH LOOP DCR C JNZ LOOP 7 T-States 4 T-States 10 T-States †¢ The first instruction initializes the loop counter and is executed only once requiring only 7 T-States. †¢ The following two instructions form a loop that requires 14 T-States to execute and is repeated 255 times until C becomes 0. Del ay Loops (Contd. ) †¢ We need to keep in mind though that in the last iteration of the loop, the JNZ instruction will fail and require only 7 T-States rather than the 10. †¢ Therefore, we must deduct 3 T-States from the total delay to get an accurate delay calculation. To calculate the delay, we use the following formula: Tdelay = TO + TL – Tdelay = total delay – TO = delay outside the loop – TL = delay of the loop †¢ TO is the sum of all delays outside the loop. Delay Loops (Contd. ) †¢ Using these formulas, we can calculate the time delay for the previous example: †¢ TO = 7 T-States – Delay of the MVI instruction †¢ TL = (14 X 255) – 3 = 3567 T-States – 14 T-States for the 2 instructions repeated 255 times (FF16 = 25510) reduced by the 3 T-States for the final JNZ. Using a Register Pair as a Loop Counter †¢ Using a single register, one can repeat a loop for a maximum count of 255 times. It is possible to increase this count by using a register pair for the loop counter instead of the single register. – A minor problem arises in how to test for the final count since DCX and INX do not modify the flags. – However, if the loop is looking for when the count becomes zero, we can use a small trick by ORing the two registers in the pair and then checking the zero flag. Using a Register Pair as a Loop Counter †¢ The following is an example of a delay loop set up with a register pair as the loop counter. LXI B, 1000H LOOP DCX B MOV A, C ORA B JNZ LOOP 10 T-States 6 T-States 4 T-States 4 T-States 10 T-StatesUsing a Register Pair as a Loop Counter †¢ Using the same formula from before, we can calculate: †¢ TO = 10 T-States – The delay for the LXI instruction †¢ TL = (24 X 4096) – 3 = 98301 T- States – 24 T-States for the 4 instructions in the loop repeated 4096 times (100016 = 409610) reduced by the 3 TStates for the JNZ in the last iterat ion. Nested Loops †¢ Nested loops can be easily setup in Assembly language by using two registers for the two loop counters and updating the right register in the right loop. – In the figure, the body of loop2 can be before or after loop1.Initialize loop 2 Body of loop 2 Initialize loop 1 Body of loop 1 Update the count1 No Is this Final Count? Yes Update the count 2 No Is this Final Count? Yes Nested Loops for Delay †¢ Instead (or in conjunction with) Register Pairs, a nested loop structure can be used to increase the total delay produced. MVI B, 10H LOOP2 MVI C, FFH LOOP1 DCR C JNZ LOOP1 DCR B JNZ LOOP2 7 T-States 7 T-States 4 T-States 10 T-States 4 T-States 10 T-States Delay Calculation of Nested Loops †¢ The calculation remains the same except that it the formula must be applied recursively to each loop. Start with the inner loop, then plug that delay in the calculation of the outer loop. †¢ Delay of inner loop – TO1 = 7 T-States †¢ MVI C, FFH instruction – TL1 = (255 X 14) – 3 = 3567 T-States †¢ 14 T-States for the DCR C and JNZ instructions repeated 255 Delay Calculation of Nested Loops †¢ Delay of outer loop – TO2 = 7 T-States †¢ MVI B, 10H instruction – TL1 = (16 X (14 + 3574)) – 3 = 57405 T-States †¢ 14 T-States for the DCR B and JNZ instructions and 3574 T-States for loop1 repeated 16 times (1016 = 1610) minus 3 for the final JNZ. – TDelay = 7 + 57405 = 57412 T-States †¢ Total Delay – TDelay = 57412 X 0. 5  µSec = 28. 06 mSec Increasing the delay †¢ The delay can be further increased by using register pairs for each of the loop counters in the nested loops setup. †¢ It can also be increased by adding dummy instructions (like NOP) in the body of the loop. Timing Diagram Representation of Various Control signals generated during Execution of an Instruction. Following Buses and Control Signals must be shown in a Timing Diagram: â € ¢Higher Order Address Bus. †¢Lower Address/Data bus †¢ALE †¢RD †¢WR †¢IO/M Timing Diagram Instruction: A000h MOV A,B Corresponding Coding: A000h 78 Timing Diagram Instruction: A000h MOV A,B Corresponding Coding: A000h 78OFC 8085 Memory Timing Diagram Instruction: A000h MOV A,B 00h T1 T2 T3 T4 A0h A15- A8 (Higher Order Address bus) Corresponding Coding: A000h 78 78h ALE RD OFC WR 8085 Memory IO/M Op-code fetch Cycle Timing Diagram Instruction: A000h MVI A,45h Corresponding Coding: A000h A001h 3E 45 Timing Diagram Instruction: A000h MVI A,45h OFC MEMR Corresponding Coding: A000h A001h 3E 45 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h A0h A15- A8 (Higher Order Address bus) 00h 3Eh 01h 45h DA7-DA0 (Lower order address/data Bus) Instruction: A000h MVI A,45h Corresponding Coding: A000h A001h 3E 45 WR RD ALEIO/M Op-Code Fetch Cycle Memory Read Cycle Timing Diagram Instruction: A000h LXI A,FO45h Corresponding Coding: A000h A001h A002h 21 45 F0 Timing Dia gram Instruction: A000h LXI A,FO45h OFC MEMR MEMR Corresponding Coding: A000h A001h A002h 21 45 F0 8085 Memory Timing Diagram Op-Code Fetch Cycle Memory Read Cycle Memory Read Cycle T1 T2 T3 T4 T5 T6 T7 T8 T9 T10 A0h A0h A0h A15- A8 (Higher Order Address bus) 00h 21h 01h 45h 02h F0h DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Timing Diagram Instruction: A000h MOV A,M Corresponding Coding: A000h 7E Timing Diagram Instruction: A000h MOV A,MOFC MEMR Corresponding Coding: A000h 7E 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h Content Of Reg H A15- A8 (Higher Order Address bus) Instruction: A000h MOV A,M Corresponding Coding: A000h 7E 00h 7Eh L Reg Content Of M DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Op-Code Fetch Cycle Memory Read Cycle Timing Diagram Instruction: A000h MOV M,A Corresponding Coding: A000h 77 Timing Diagram Instruction: A000h MOV M,A OFC MEMW Corresponding Coding: A000h 77 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h Content Of Reg H A15- A8 (Higher Order Address bus)Instruction: A000h MOV M,A Corresponding Coding: A000h 77 00h 7Eh L Reg Content of Reg A DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Op-Code Fetch Cycle Memory Write Cycle Chapter 9 Stack and Subroutines The Stack †¢ The stack is an area of memory identified by the programmer for temporary storage of information. †¢ The stack is a LIFO structure. – Last In First Out. †¢ The stack normally grows backwards into memory. – In other words, the programmer defines the bottom of the stack and the stack grows up into reducing address range. The Stack grows backwards into memory Memory Bottom of the Stack The Stack Given that the stack grows backwards into memory, it is customary to place the bottom of the stack at the end of memory to keep it as far away from user programs as possible. †¢ In the 8085, the stack is defined by setting the SP (Stack Pointer) register. LXI SP, FFFFH †¢ This sets the Stack Pointer to location FFFFH (end of memory for the 8085). Saving Information on the Stack †¢ Information is saved on the stack by PUSHing it on. – It is retrieved from the stack by POPing it off. †¢ The 8085 provides two instructions: PUSH and POP for storing information on the stack and retrieving it back. – Both PUSH and POP work with register pairs ONLY.The PUSH Instruction †¢ PUSH B – Decrement SP – Copy the contents of register B to the memory location pointed to by SP – Decrement BSP C F3 12 – Copy the contents of register C to the memory location pointed to by SP F3 FFFB FFFC FFFD FFFE FFFF 12 SP The POP Instruction †¢ POP D – Copy the contents of the memory location pointed to by the SP to register E – Increment SP – Copy the contents of the memory location D E F3 12 pointed to by the SP to register D – Increment SP F3 SP FFFB FFFC FFFD FFFE FFFF 12 Operation of the Stack †¢ During pushing, the stack operates in a â€Å"decrement then store† style. The stack pointer is decremented first, then the information is placed on the stack. †¢ During poping, the stack operates in a â€Å"use then increment† style. – The information is retrieved from the top of the the stack and then the pointer is incremented. †¢ The SP pointer always points to â€Å"the top of the stack†. LIFO †¢ The order of PUSHs and POPs must be opposite of each other in order to retrieve information back into its original location. PUSH B PUSH D †¦ POP D POP B The PSW Register Pair †¢ The 8085 recognizes one additional register pair called the PSW (Program Status Word). This register pair is made up of the Accumulator and the Flags registers. †¢ It is possible to push the PSW onto the stack, do whatever operations are needed, then POP it off of the stack. – The result is that the contents of the Accumulator and the status of the Flags are ret urned to what they were before the operations were executed. Subroutines †¢ A subroutine is a group of instructions that will be used repeatedly in different locations of the program. – Rather than repeat the same instructions several times, they can be grouped into a subroutine that is called from the different locations. In Assembly language, a subroutine can exist anywhere in the code. – However, it is customary to place subroutines separately from the main program. Subroutines †¢ The 8085 has two instructions for dealing with subroutines. – The CALL instruction is used to redirect program execution to the subroutine. – The RTE insutruction is used to return the execution to the calling routine. The CALL Instruction †¢ CALL 4000H – Push the address of the instruction immediately following the CALL onto the stack 2000 CALL 4000 2003 counter – Load the program PC 2 0 0 3with the 16-bit address supplied with the CALL instructi on. FFFB FFFC FFFD FFFE FFFF 3 20 SP The RTE Instruction †¢ RTE – Retrieve the return address from the top of the stack – Load the program counter with the return address. 2003 PC 4014 4015 †¦ RTE FFFB FFFC FFFD FFFE FFFF 03 20 SP Cautions †¢ The CALL instruction places the return address at the two memory locations immediately before where the Stack Pointer is pointing. – You must set the SP correctly BEFORE using the CALL instruction. †¢ The RTE instruction takes the contents of the two memory locations at the top of the stack and uses these as the return address. – Do not modify the stack pointer in a subroutine. You will loose the return address.Passing Data to a Subroutine †¢ In Assembly Language data is passed to a subroutine through registers. – The data is stored in one of the registers by the calling program and the subroutine uses the value from the register. †¢ The other possibility is to use agreed upon mem ory locations. – The calling program stores the data in the memory location and the subroutine retrieves the data from the location and uses it. Call by Reference and Call by Value †¢ If the subroutine performs operations on the contents of the registers, then these modifications will be transferred back to the calling program upon returning from a subroutine. Call by reference †¢ If this is not desired, the subroutine should PUSH all the registers it needs on the stack on entry and POP them on return. – The original values are restored before execution returns to the calling program. Cautions with PUSH and POP †¢ PUSH and POP should be used in opposite order. †¢ There has to be as many POP’s as there are PUSH’s. – If not, the RET statement will pick up the wrong information from the top of the stack and the program will fail. †¢ It is not advisable to place PUSH or POP inside a loop. Conditional CALL and RTE Instructions à ¢â‚¬ ¢ The 8085 supports conditional CALL and conditional RTE instructions. The same conditions used with conditional JUMP instructions can be used. – – – – – CC, call subroutine if Carry flag is set. CNC, call subroutine if Carry flag is not set RC, return from subroutine if Carry flag is set RNC, return from subroutine if Carry flag is not set Etc. A Proper Subroutine †¢ According to Software Engineering practices, a proper subroutine: – Is only entered with a CALL and exited with an RTE – Has a single entry point †¢ Do not use a CALL statement to jump into different points of the same subroutine. – Has a single exit point †¢ There should be one return statement from any subroutine. Following these rules, there should not be any confusion with PUSH and POP usage. The Design and Operation of Memory Memory in a microprocessor system is where information (data and instructions) is kept. It can be classified into t wo main types: ? ? Main memory (RAM and ROM) Storage memory (Disks , CD ROMs, etc. ) The simple view of RAM is that it is made up of registers that are made up of flip-flops (or memory elements). ? ROM on the other hand uses diodes instead of the flip-flops to permanently hold the information. The number of flip-flops in a â€Å"memory register† determines the size of the memory word. Accessing Information in Memory For the microprocessor to access (Read or Write) information in memory (RAM or ROM), it needs to do the following: Select the right memory chip (using part of the address bus). Identify the memory location (using the rest of the address bus). Access the data (using the data bus). 2 Tri-State Buffers An important circuit element that is used extensively in memory. This buffer is a logic circuit that has three states: Logic 0, logic1, and high impedance. When this circuit is in high impedance mode it looks as if it is disconnected from the output completely.The Outp ut is Low The Output is High High Impedance 3 The Tri-State Buffer This circuit has two inputs and one output. The first input behaves like the normal input for the circuit. The second input is an â€Å"enable†. ? ? If it is set high, the output follows the proper circuit behavior. If it is set low, the output looks like a wire connected to nothing. Output Input OR Input Output Enable Enable 4 The Basic Memory Element The basic memory element is similar to a D latch. This latch has an input where the data comes in. It has an enable input and an output on which data comes out. Data Input D Data Output QEnable EN 5 The Basic Memory Element However, this is not safe. Data is always present on the input and the output is always set to the contents of the latch. To avoid this, tri-state buffers are added at the input and output of the latch. Data Input D Data Output Q RD Enable EN WR 6 The Basic Memory Element The WR signal controls the input buffer. The bar over WR means that thi s is an active low signal. So, if WR is 0 the input data reaches the latch input. If WR is 1 the input of the latch looks like a wire connected to nothing. The RD signal controls the output in a similar manner. A Memory â€Å"Register† If we take four of these latches and connect them together, we would have a 4-bit memory register I0 WR I1 I2 I3 D Q EN EN RD D Q EN D Q EN D Q EN O0 O1 O2 O3 8 A group of memory registers D0 o D1 o o D2 o D3 WR D EN Q D EN Q D EN Q D EN Q D Q D EN Q D EN Q D EN Q Expanding on this scheme to add more memory registers we get the diagram to the right. EN D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q o o o o RD D0 D1 D2 9 D3 Externally Initiated Operations External devices can initiate (start) one of the 4 following operations: Reset ?All operations are stopped and the program counter is reset to 0000. The microprocessor’s operations are interrupted and the microprocessor executes what is called a â€Å"service routine†. Th is routine â€Å"handles† the interrupt, (perform the necessary operations). Then the microprocessor returns to its previous operations and continues. Interrupt ? ? 10 A group of Memory Registers If we represent each memory location (Register) as a block we get the following I0 I1 I2 I3 WR EN0 EN1 EN2 EN3 RD O0 Input Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 Output Buffers O1 O2 O3 11The Design of a Memory Chip Using the RD and WR controls we can determine the direction of flow either into or out of memory. Then using the appropriate Enable input we enable an individual memory register. What we have just designed is a memory with 4 locations and each location has 4 elements (bits). This memory would be called 4 X 4 [Number of location X number of bits per location]. 12 The Enable Inputs How do we produce these enable line? Since we can never have more than one of these enables active at the same time, we can have them encoded to reduce the number of line s coming into the chip.These encoded lines are the address lines for memory. 13 The Design of a Memory Chip So, the previous diagram would now look like the following: I I I I 0 1 2 3 WR A d d r e s s D e c o d e r Input Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 Output Buffers A1 A0 RD O0 O1 O2 O3 14 The Design of a Memory Chip Since we have tri-state buffers on both the inputs and outputs of the flip flops, we can actually use one set of pins only. Input Buffers WR A1 A0 A D The chip Memory Reg. now look likeDthis: would 0 d e 0 D0 A1 A0 D1 D2 D3 d r e s s c o d e r Memory Reg. 1 Memory Reg. 2 Memory Reg. Output Buffers D1 D2 D3 RD RD WR 15 The steps of writing into Memory What happens when the programmer issues the STA instruction? The microprocessor would turn on the WR control (WR = 0) and turn off the RD control (RD = 1). The address is applied to the address decoder which generates a single Enable signal to turn on only one of the memory registers. The da ta is then applied on the data lines and it is stored into the enabled register. 16 Dimensions of Memory Memory is usually measured by two numbers: its length and its width (Length X Width). ? ? The length is the total number of locations.The width is the number of bits in each location. The length (total number of locations) is a function of the number of address lines. # of memory locations = 2( # of address lines) 210 = 1024 locations (1K) ? So, a memory chip with 10 address lines would have Looking at it from the other side, a memory chip with 4K locations would need ? Log2 4096=12 address lines 17 The 8085 and Memory The 8085 has 16 address lines. That means it can address 216 = 64K memory locations. Then it will need 1 memory chip with 64 k locations, or 2 chips with 32 K in each, or 4 with 16 K each or 16 of the 4 K chips, etc. ow would we use these address lines to control the multiple chips? 18 Chip Select Usually, each memory chip has a CS (Chip Select) input. The chip wil l only work if an active signal is applied on that input. To allow the use of multiple chips in the make up of memory, we need to use a number of the address lines for the purpose of â€Å"chip selection†. These address lines are decoded to generate the 2n necessary CS inputs for the memory chips to be used. 19 Chip Selection Example Assume that we need to build a memory system made up of 4 of the 4 X 4 memory chips we designed earlier.We will need to use 2 inputs and a decoder to identify which chip will be used at what time. The resulting design would now look like the one on the following slide. 20 Chip Selection Example RD WR D0 D1 RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS A0 A1 A2 A3 2 X4 Decoder 21 Memory Map and Addresses The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 0000 0000 EPROM 3FFF 4400 Address Range of EPROM Chip Address Range RAM 1 RAM 2 RAM 3 Ad dress Range of 1st RAM Chip 5FFF 6000 Address Range of 2nd RAM Chip FFF 9000 A3FF A400 Address Range of 3rd RAM Chip RAM 4 F7FF FFFF Address Range of 4th RAM Chip 22 Address Range of a Memory Chip The address range of a particular chip is the list of all addresses that are mapped to the chip. An example for the address range and its relationship to the memory chips would be the Post Office Boxes in the post office. †¢ Each box has its unique number that is assigned sequentially. (memory locations) †¢ The boxes are grouped into groups. (memory chips) †¢ The first box in a group has the number immediately after the last box in the previous group. 23 Address Range of a Memory ChipThe above example can be modified slightly to make it closer to our discussion on memory. †¢ Let’s say that this post office has only 1000 boxes. †¢ Let’s also say that these are grouped into 10 groups of 100 boxes each. Boxes 0000 to 0099 are in group 0, boxes 0100 to 01 99 are in group 1 and so on. We can look at the box number as if it is made up of two pieces: †¢ The group number and the box’s index within the group. †¢ So, box number 436 is the 36th box in the 4th group. The upper digit of the box number identifies the group and the lower two digits identify the box within the group. 24The 8085 and Address Ranges The 8085 has 16 address lines. So, it can address a total of 64K memory locations. If we use memory chips with 1K locations each, then we will need 64 such chips. The 1K memory chip needs 10 address lines to uniquely identify the 1K locations. (log21024 = 10) That leaves 6 address lines which is the exact number needed for selecting between the 64 different chips (log264 = 6). 25 The 8085 and Address Ranges Now, we can break up the 16-bit address of the 8085 into two pieces: A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0 Chip Selection Location Selection within the ChipDepending on the combination on the address lines A15 – A10 , the address range of the specified chip is determined. 26 Chip Select Example A chip that uses the combination A15 – A10 = 001000 would have addresses that range from 2000H to 23FFH. Keep in mind that the 10 address lines on the chip gives a range of 00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the chips. The memory chip in this example would require the following circuit on its chip select input: A 10 A 11 A 12 A 13 A 14 A 15 CS 27 Chip Select Example If we change the above combination to the following: A 10 A 11 A 12 A 13 A 14 A 15 CSNow the chip would have addresses ranging from: 2400 to 27FF. Changing the combination of the address bits connected to the chip select changes the address range for the memory chip. 28 Chip Select Example To illustrate this with a picture: ? ? in the first case, the memory chip occupies the piece of the memory map identified as before. In the second case, it occupies the piece identified as after. Before Af ter 0000 2000 23FF 2400 27FF 0000 FFFF FFFF 29 High-Order vs. Low-Order Address Lines The address lines from a microprocessor can be classified into two types: High-Order ? Low-Order ?