Saturday, August 22, 2020

The effects of flood damage on everyday life

The impacts of flood harm on regular day to day existence Flood is typically a flood of a territory of water that lowers land and the inflow of tide onto land. Floods are the most successive and exorbitant regular risks, causing just about 90 percent of all the harm identified with catastrophic events. Floods as a rule cause enormous scope loss of human life and wide spread harm to properties. This harm is known as flood harm. Unbelievable harm will be caused to agribusiness, along these lines influencing the United States arranging and this will disturb its money related planning, in this way hindering the economy in general. The impacts of flood harm can be arranged into three kinds, in particular, essential, optional and tertiary. The essential impacts of flood harm incorporate physical harms like harm to spans, vehicles, structures, sewer frameworks, roadways, and even setbacks like individuals and domesticated animals demise due to suffocating. The essential impact of floods is because of direct contact with the rising waters. The speed of water will in general be high in floods and subsequently, release increments as speed increments. As a result of overabundance precipitation, the waterways and streams stream with higher speeds wherein they can move bigger particles like shakes as suspended burden. Such enormous particles incorporate shakes and dregs as well as during a flood it could likewise incorporate huge items, for example, autos, houses and scaffolds. Huge measures of disintegration during the floods can subvert connect structures, levees, and structures causing their breakdown. During floods, water will likewise enter human fabricated structures causing water harm. The flood harm to houses incorporate destroying of furniture, harm to the floors and dividers of the house and harm to whatever other thing that interacts with the water. Vehicles on the streets get abandoned in the floods and they become overly energetic by the rising waters or water goes into the car, which brings about harm that can't be handily fixed. The rising water conveys residue as suspended burden. As the rising waters retreat, the dregs get saved and things and structures including the inside of structures generally get secured with a thick layer of stream-kept mud. Farmlands influenced by floods face a gigantic misfortune as they as a rule bring about harvest misfortune. Domesticated animals, pets, and different creatures are regularly diverted by the solid flows of the rising water. People who get trapped in the high speed rising waters regularly get suffocated. Among the optional impacts of flood harm are the interruption of numerous fundamental administrations like gas and power. Flood harm likewise incorporates the defilement of the drinking water gracefully, if sewage treatment plants are overflowed. This represents a more prominent danger since this may bring about sickness and other wellbeing perils, particularly in immature nations. The open transportation frameworks may likewise be disturbed during floods, bringing about deficiencies of food and different supplies. Tertiary impacts of flood harm are commonly long haul impacts like the area of waterway channels that may change on account of flooding; less new channels will create, leaving the old channels dry. Farmlands with crops get demolished by the residue statement brought about by the floods. Individuals will most likely be unable to make it to their work environment because of disturbance of administrations. The floods may likewise bring about decimation of untamed life living space. In spite of the fact that floods have a few favorable circumstances, on the off chance that we take a gander at it in a more extensive point of view we can presume that to a great extent, floods cause destruction to life and property of humanity. By following different preventive estimates the impacts of flood harm can be diminished all things considered.

Thursday, July 16, 2020

Understanding the Causes of Bathmophobia

Understanding the Causes of Bathmophobia Phobias Types Print Understanding the Causes of Bathmophobia Causes and Diagnosis From Fear of the Stairs or Slopes By Lisa Fritscher Lisa Fritscher is a freelance writer and editor with a deep interest in phobias and other mental health topics. Learn about our editorial policy Lisa Fritscher Medically reviewed by Medically reviewed by Steven Gans, MD on June 08, 2016 Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital. Learn about our Medical Review Board Steven Gans, MD Updated on December 01, 2019 Robyn Hodgson/EyeEm/Getty Images More in Phobias Types Causes Symptoms and Diagnosis Treatment Bathmophobia, or the fear of slopes or stairs, is a somewhat complicated phobia. Its quite similar to climacophobia, or the fear of climbing stairs, except in its specific focus. If you have bathmophobia, you might panic when simply observing a steep slope, while people with climacophobia typically experience symptoms only when expected to actually climb or descend. The difference is subtle but important, and can only be accurately diagnosed by a trained clinician. Bathmophobia can be seen in both children and adults. It is also fairly common among animals, particularly household pets. If your child has a fear of stairs or slopes, keep in mind that fears are a normal part of development. Bathmophobia, as with other phobias, is generally not diagnosed in children unless it persists for more than six months. Causes Bathmophobia may be caused by a wide range of factors. A particularly common cause is an early negative experience with stairs or a steep hill. If you slipped or fell on steep stairs or watched someone else struggle with shortness of breath while climbing, you may be at a greater risk of developing bathmophobia. Particularly in children, bathmophobia can also be triggered by negotiating or even just contemplating a particularly scary looking set of stairs. One example is a child involved in a local community theater with stairs leading to the backstage costume loft. The stairs were steep and open at the back so you could see down as you climbed them, and the child could imagine slipping through them, even though she didnt ever climb them herself. Memories of those stairs played into dreams that included struggling to cross a sloped floor that would tilt to near-vertical as she neared her destination in the dreams. She continues to feel apprehension when confronted with a sloped floor or a tricky set of stairs. Understanding Dreams and REM Sleep Differential Diagnosis In addition to the above-mentioned climacophobia, bathmophobia may be related to other disorders. Acrophobia, or the fear of heights, is exceptionally common. What appears to be a fear of stairs may, in fact, be a fear of the height that the stairs achieve. Illygnophobia, or the fear of vertigo, can also cause symptoms similar to those of bathmophobia. Medical causes must also be considered. True vertigo is a medical disorder of the balance system that causes a feeling of spinning or dizziness. The term is also applied medically to similar symptoms that are not caused by a balance disorder. Both types can be worsened by even minor changes in height. By definition, a fear that is reasonable due to an existing medical condition cannot be called a phobia. If you have medical vertigo, fearing that stairs and slopes may trigger your symptoms does not mean that you also have bathmophobia. Treatment If your clinician determines that your symptoms are caused by bathmophobia, you are likely to receive cognitive-behavioral therapy  (CBT). The goal of this type of therapy is to help you replace your fearful thoughts and behaviors with more rational alternatives. You will be taught relaxation exercises to help you remain calm, and slowly introduced to the object of your fear through a process known as systematic desensitization. Although it takes time, therapy has an excellent success rate in treating this type of phobia. Choosing a therapist that you trust is an essential component in working through your fear.

Thursday, May 21, 2020

The relationship between appearance sel-esteem and body image among men and women Free Essay Example, 1250 words

The study focused on global perspective with six domains ad while this did not identify significance, a modification that classified the target opulation into two domain identifies significance of contingency self worth as a determinant of the relationship between self esteem and attitude towards self. Significance in the latter results suggest that self esteem is significant to self image (Geng and Jiang, 2013). An independent study on eating habit, body dissatisfaction, and self esteem also identifies a potential association betweeb self esteem and body image. Acknowledging esistence of literature with divergent results on the relationship between the three factors, the authors explored pairwise association between the three variables. They used the Negative Physical Self Scale-Fatness, the State Self-Esteem Scale, and the Three Factor Eating Questionnaire Revised 18-Item Version to collect data from 376 chinese students. Self esteem reported significant mediator role in the relat ionship between body dissatisfaction and eating behavior through restrained eating, an indicator of the significant effects of self image on perceived body dissatisfaction (Kong, Zang, You, Fan, Tiang and Zhou, 2013). Armitage however notes that perceived body image may not necessarily be due to self-esteem. We will write a custom essay sample on The relationship between appearance sel-esteem and body image among men and women or any topic specifically for you Only $17.96 $11.86/pageorder now Using 220 adolescents with a self affirmation treatment, before data collection on possible threats, body satisfaction, and self esteem, self affirmation was significant among girls with moderation effect of self esteem. Self affirmation was however not significal in the considered adolescent boys (Armitage, 2012). While literature identifies significance of self esteem to people’s self worth and secondary effects on health and activities in which people engage, empirical data offers conflicting intormation on significance of self-esteem on body image. Data for evaluating the relationship between self esteem and perception of body image are also largely subjective and this challenges validity of the developed knowledge for generalization. There is therefore need to establish the relationship for each sub population of interest and this forms the basis of this study. Aims and hypotheses The study aims at investigating difference in effects of appearance self esteem on body image by gender and the relationship between appearance self esteem and body image. It explores the objectives by seeking to answer the following research questions. Do women have a lower appearance self esteem in terms of body image than men have

Wednesday, May 6, 2020

History, Philosophy And Miscellaneous Works - 881 Words

Literature Review Libraries have a long history towards the ancient world as places used to keep important records such as clay tablets, transcripts and many texts. Many records were destroyed in the course of wars or purposely by some rulers with the changes in government. As a result, writing of literature as well as record keeping was encouraged where classification schemes were initiated to preserve those records of all times. The first formal classification was categorizing the writings into four types, the classics, history, philosophy and miscellaneous works. (Library, 2016). However, these broad categories didn’t help much in guiding to access the increasing collection. The result was, introducing Dewey Decimal Classification as a scheme for the classification of the documents/ materials. (Library, 2016). Dewey Decimal Classification (DDC) DDC was an invention of Melvil Dewey in 1876. He was an Assistant Librarian at Amherst College when he published DDC as â€Å"A Classification and subject index for cataloging and arranging the books pamphlets of a library†. (Yoon, J. 2014). The system was formulated to organize the contents of the library based on the subject areas divided into 10 main groups where each group is given 100 numbers. For example, Religion belongs in 200 – 299. (DDC, 2016). This numerical classification gives identification for the item as well as a location tool which ensures the books under the same subject are kept together in a common area. (Wiercioch,Show MoreRelatedThe Major Works of Thomas Carlyle Essay1582 Words   |  7 Pagesstonemason, and Margaret Carlyle. The two great influences on his thought and work were the Bible and the modern German philosophy. He was in spirit a revolutionary of the Romantic Period utterly dissatisfied with modern commercialism and a champion of the s implicities of life. He openly admired the qualities of courage and endurance as can be seen from his treatment of the heroes of history. The striking feature of his work was the burning enthusiasm that lights up every utterance (Compton-RickettRead MoreD. Kinds Of Programs Or User Needs Support1541 Words   |  7 Pageslibrary works together with the school media centers to support the needs of their students, the public library does not collect or maintain textbooks. II. General Priorities and Limitations Governing Selection Forms of materials to be collected or excluded. The Library will collect materials in a variety of formats divided into three main types: print (hardcover books, paperback books, large-print books, graphic novels, newspapers, magazines, etc.), non-print (CDs, DVDs, and miscellaneous objectsRead MoreA Study On Norwich University Essay1087 Words   |  5 Pagesexperience. There are online Bachelor’s degrees in Interdisciplinary Studies, Criminal Justice, Cyber Security, Management Studies and Strategic Studies and Defense Analysis. Online Master s degrees include Diplomacy, International Relations, Military History, Business Administration, Civil Engineering, Executive Leadership and Public Administration. Norwich University Accreditation Details Norwich University is accredited by the New England Association of Schools and Colleges’ (NEASC) Commission onRead MoreCase Study : Walmart Case Study1252 Words   |  6 Pages Walmart case study To start of my case study, I’ll give you a brief history of Walmart’s background and what they do as a company, I will reiterate some of their contributing to society. I’ll also touch on some of the information I learned in the article and my take on it. Per the case study article Wal-Mart is the largest retail store in the United States, and is larger than any other retail chain in the world. Currently Wal-Mart operates over 4Read MoreMalcolm X And Langston Hughes Essay898 Words   |  4 PagesFor the whole of America’s existence, its citizens have exhibited miscellaneous personalities and life choices. Quality examples of this diversity is easily seen in the nation’s literature.   America’s foundation was made of rebels and revolutionists who weren’t happy about the relationship they had with England. Through perseverance and unlikely partnerships, America was able to rise and become a country. The citizens that emerged from thi s long and hard process had all kinds of mixed perspectivesRead MoreCharles Darwing and The Theory of Evolution Essay803 Words   |  4 Pagesenvironments. Even without his Theory of Evolution, Darwins achievements would be difficult to match. His many brilliant original works in geology, botany, bio-geography, zoology, psychology, taxonomy, paleontology, philosophy, anthropology, literature, theology, entomology, and scientific travel would still make him one of the most open-minded and distinguished workers in the history of science. Darwin stated this in the 2nd edition of his Journal of researches, â€Å"Where on the face of the earth can we findRead MoreBusiness Plan For Lululemon Athletica Essay1170 Words   |  5 Pages Proposed By: Chelsea Anhorn Erin Kampen Lyndon Lipinski Bryce Lipinski 500 University Ave W Minot ND 58707 701.858.3000 TABLE OF CONTENTS EXECUTIVE SUMMARY Page 1 Company History Product Description Marketing and Sales Development Operations Management Goals and Strategies Financial Summary COMPANY HISTORY Page ### Country Profile Business Customs Product Preferences Buying Habits Prices Disposable Income CompetitorsRead MoreNew Deal Under Attack1560 Words   |  7 Pagesaverage wealth of the country. Also no one can have a fortune of more than 100 to 300 times the average family fortune. Secondly, the yearly family income will not be less than one-third the average family income. Thirdly, the average hours on a typical work day will be regulated in order to prevent overproduction and to give workers some time for recreational activity. Finally he plans to agree to pension program for people over 60 years of age, pay the veterans of our wars, provide equal opportunityRead MoreBeyond Massa: Sugar Management in the British Caribbean by John F. Campbell1223 Words   |  5 Pagesdevelopment of amelioration policies, to the abolition of the slave trade in 1807, and finally the failed industry in 1834. The book uses archival data which logically analyses, revises and modifies the historical ideologies, thus manifesting revisionist philosophies about sugar estates in the Carib bean region. It really sets the reader to have different insights and perspectives with respect to the managerial systems, hierarchical structure, political dimensions, social relationships and a relatively new fieldRead MoreOriginal Writing : The 250000 Square1738 Words   |  7 PagesThe building’s distinctive curvilinear form, evoking a wind-sculpted rock formation, grew out of this early work, forming the basis for the architecture. The 250,000-square foot structure is clad in Kasota limestone and is surrounded by an eastern lowland landscape amid numerous water features. Special design elements of the museum, such as an east-facing entrance, a prism window, and the 120-foot high Potomac Atrium dome and skylight devoted to contemporary Native performances, reflect distinctly

Central Processing Unit and Memory Location Free Essays

string(20) " the picture a bit\." MICROPROCESSOR 8085 †¢ Reference Book: – Ramesh S. Goankar, â€Å"Microprocessor Architecture, Programming and Applications with 8085†, 5th Edition, Prentice Hall †¢ Week 1 – Basic Concept and Ideas about Microprocessor. †¢ Week 2 – Architecture of 8085 †¢ Week 3 – Addressing Modes and Instruction set of 8085 †¢ Week 4 – Interrupts of 8085 †¢ Week 5 onwards – Peripherals. We will write a custom essay sample on Central Processing Unit and Memory Location or any similar topic only for you Order Now Basic Concepts of Microprocessors †¢ Differences between: – Microcomputer – a computer with a microprocessor as its CPU. Includes memory, I/O etc. Microprocessor – silicon chip which includes ALU, register circuits control circuits – Microcontroller – silicon chip which includes microprocessor, memory I/O in a single package. What is a Microprocessor? †¢ The word comes from the combination micro and processor. – Processor means a device that processes whatever. In this context processor means a device that processes numbers, specifically binary numbers, 0’s and 1’s. †¢ To process means to manipulate. It is a general term that describes all manipulation. Again in this content, it means to perform certain operations on the numbers that depend on the microprocessor’s design. What about micro? †¢ Micro is a new addition. – In the late 1960’s, processors were built using discrete elements. †¢ These devices performed the required operation, but were too large and too slow. – In the early 1970’s the microchip was invented. All of the components that made up the processor were now placed on a single piece of silicon. The size became several thousand times smaller and the speed became several hundred times faster. The â€Å"Micro†Processor was born. Was there ever a â€Å"mini†processor? †¢ No. – It went directly from discrete elements to a single chip. However, omparing today’s microprocessors to the ones built in the early 1970’s you find an extreme increase in the amount of integration. †¢ So, What is a microprocessor? Definition of the Microprocessor The microprocessor is a programmable device that takes in numbers, performs on them arithmetic or logical operations according to the program stored in memory and then produces other numbers as a result. Definition (Contd. ) †¢ Lets expand each of the underlined words: – Programmable device: The microprocessor can perform different sets of operations on the data it receives depending on the sequence of instructions supplied in the given program. By changing the program, the microprocessor manipulates the data in different ways. – Instructions: Each microprocessor is designed to execute a specific group of operations. This group of operations is called an instruction set. This instruction set defines what the microprocessor can and cannot do. Definition (Contd. ) – Takes in: The data that the microprocessor manipulates must come from somewhere. †¢ It comes from what is called â€Å"input devices†. †¢ These are devices that bring data into the system from the outside world. †¢ These represent devices such as a keyboard, a mouse, switches, and the like. Definition (Contd. ) – Numbers: The microprocessor has a very narrow view on life. It only understands binary numbers. A binary digit is called a bit (which comes from binary digit). The microprocessor recognizes and processes a group of bits together. This group of bits is called a â€Å"word†. The number of bits in a Microprocessor’s word, is a measure of its â€Å"abilities†. Definition (Contd. ) – Words, Bytes, etc. †¢ The earliest microprocessor (the Intel 8088 and Motorola’s 6800) recognized 8-bit words. – They processed information 8-bits at a time. That’s why they are called â€Å"8-bit processors†. They can handle large numbers, but in order to process these numbers, they broke them into 8-bit pieces and processed each group of 8-bits separately. †¢ Later microprocessors (8086 and 68000) were designed with 16-bit words. – A group of 8-bits were referred to as a â€Å"half-word† or â€Å"byte†. – A group of 4 bits is called a â€Å"nibble†. – Also, 32 bit groups were given the name â€Å"long word†. †¢ Today, all processors manipulate at least 32 bits at a time and there exists microprocessors that can process 64, 80, 128 bits Definition (Contd. ) – Arithmetic and Logic Operations: Every microprocessor has arithmetic operations such as add and subtract as part of its instruction set. – Most microprocessors will have operations such as multiply and divide. – Some of the newer ones will have complex operations such as square root. †¢ In addition, microprocessors have logic operations as well. Such as AND, OR, XOR, shift left, shift right, etc. †¢ Again, the number and types of operations define the microprocessor’s instruction set and depends on the specific microprocessor. Definition (Contd. ) – Stored in memory : †¢ First, what is memory? – Memory is the location where information is kept while not in current use. Memory is a collection of storage devices. Usually, each storage device holds one bit. Also, in most kinds of memory, these storage devices are grouped into groups of 8. These 8 storage locations can only be accessed together. So, one can only read or write in terms of bytes to and form memory. – Memory is usually measured by the number of bytes it can hold. It is measured in Kilos, Megas and lately Gigas. A Kilo in computer language is 210 =1024. So, a KB (KiloByte) is 1024 bytes. Mega is 1024 Kilos and Giga is 1024 Mega. Definition (Contd. ) – Stored in memory: †¢ When a program is entered into a computer, it is stored in memory. Then as the microprocessor starts to execute the instructions, it brings the instructions from memory one at a time. †¢ Memory is also used to hold the data. – The microprocessor reads (brings in) the data from memory when it needs it and writes (stores) the results into memory when it is done. Definition (Contd. ) – Produces: For the user to see the result of the execution of the program, the results must be presented in a human readable form. †¢ The results must be presented on an output device. †¢ This can be the monitor, a paper from the printer, a simple LED or many other forms. A Microprocessor-based system From the above description, we can draw the following block diagram to represent a microprocessor-based system: Input Output Memory Inside The Microprocessor †¢ Internally, the microprocessor is made up of 3 main units. – The Arithmetic/Logic Unit (ALU) – The Control Unit. – An array of registers for holding data while it is being manipulated. Organization of a microprocessorbased system †¢ Let’s expand the picture a bit. You read "Central Processing Unit and Memory Location" in category "Essay examples" I/O Input / Output ALU Register Array System Bus Memory ROM RAM Control Memory †¢ Memory stores information such as instructions and data in binary format (0 and 1). It provides this information to the microprocessor whenever it is needed. †¢ Usually, there is a memory â€Å"sub-system† in a microprocessor-based system. This sub-system includes: – The registers inside the microprocessor – Read Only Memory (ROM) †¢ used to store information that does not change. – Random Access Memory (RAM) (also known as Read/Write Memory). †¢ used to store information supplied by the user. Such as programs and data. Memory Map and Addresses †¢ The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 000 0000 EPROM 3FFF 4400 Address Range of EPROM Chip Address Range RAM 1 RAM 2 RAM 3 Address Range of 1st RAM Chip 5FFF 6000 Address Range of 2nd RAM Chip 8FFF 9000 A3FF A400 Address Range of 3rd RAM Chip RAM 4 F7FF FFFF Address Range of 4th RAM Chip Memory †¢ To execute a program: – the user enters its instructions in bi nary format into the memory. – The microprocessor then reads these instructions and whatever data is needed from memory, executes the instructions and places the results either in memory or produces it on an output device. The three cycle instruction execution model To execute a program, the microprocessor â€Å"reads† each instruction from memory, â€Å"interprets† it, then â€Å"executes† it. †¢ To use the right names for the cycles: – The microprocessor fetches each instruction, – decodes it, – Then executes it. †¢ This sequence is continued until all instructions are performed. Machine Language †¢ The number of bits that form the â€Å"word† of a microprocessor is fixed for that particular processor. – These bits define a maximum number of combinations. †¢ For example an 8-bit microprocessor can have at most 28 = 256 different combinations. However, in most microprocessors, not all of these combin ations are used. – Certain patterns are chosen and assigned specific meanings. – Each of these patterns forms an instruction for the microprocessor. – The complete set of patterns makes up the microprocessor’s machine language. The 8085 Machine Language †¢ The 8085 (from Intel) is an 8-bit microprocessor. – The 8085 uses a total of 246 bit patterns to form its instruction set. – These 246 patterns represent only 74 instructions. †¢ The reason for the difference is that some (actually most) instructions have multiple different formats. Because it is very difficult to enter the bit patterns correctly, they are usually entered in hexadecimal instead of binary. †¢ For example, the combination 0011 1100 which translates into â€Å"increment the number in the register called the accumulator†, is usually entered as 3C. Assembly Language †¢ Entering the instructions using hexadecimal is quite easier than entering the binar y combinations. – However, it still is difficult to understand what a program written in hexadecimal does. – So, each company defines a symbolic code for the instructions. – These codes are called â€Å"mnemonics†. The mnemonic for each instruction is usually a group of letters that suggest the operation performed. Assembly Language †¢ Using the same example from before, – 00111100 translates to 3C in hexadecimal (OPCODE) – Its mnemonic is: â€Å"INR A†. – INR stands for â€Å"increment register† and A is short for accumulator. †¢ Another example is: 1000 0000, – Which translates to 80 in hexadecimal. – Its mnemonic is â€Å"ADD B†. – â€Å"Add register B to the accumulator and keep the result in the accumulator†. Assembly Language †¢ It is important to remember that a machine language and its associated assembly language are completely machine dependent. In other words, they are not transferable from one microprocessor to a different one. †¢ For example, Motorolla has an 8-bit microprocessor called the 6800. – The 8085 machine language is very different from that of the 6800. So is the assembly language. – A program written for the 8085 cannot be executed on the 6800 and vice versa. â€Å"Assembling† The Program †¢ How does assembly language get translated into machine language? – There are two ways: – 1st there is â€Å"hand assembly†. †¢ The programmer translates each assembly language instruction into its equivalent hexadecimal code (machine language). Then the hexadecimal code is entered into memory. – The other possibility is a program called an â€Å"assembler†, which does the translation automatically. 8085 Microprocessor Architecture †¢ †¢ †¢ †¢ †¢ †¢ 8-bit general purpose  µp Capable of addressing 64 k of memory Has 40 pins Requires +5 v power supply Can operate with 3 MHz clock 8085 upward compatible Pins Power Supply: +5 V Frequency Generator is connected to those pins Input/Output/ Memory Read Write Multiplexed Address Data Bus Address latch Enable Address Bus †¢ System Bus – wires connecting memory I/O to microprocessor – Address Bus Unidirectional †¢ Identifying peripheral or memory location – Data Bus †¢ Bidirectional †¢ Transferring data – Control Bus †¢ Synchronization signals †¢ Timing signals †¢ Control signal Architecture of Intel 8085 Microprocessor Intel 8085 Microprocessor †¢ Microprocessor consists of: – – – – – Control unit: control microprocessor operations. ALU: performs data processing function. Registers: provide storage internal to CPU. Interrupts Internal data bus The ALU †¢ In addition to the arithmetic logic circuits, the ALU includes the accumulator, which is part of every arithmetic logic operation. Also, the ALU includes a temporary register used for holding data temporarily during the execution of the operation. This temporary register is not accessible by the programmer. †¢ Registers – General Purpose Registers †¢ B, C, D, E, H L (8 bit registers) †¢ Can be used singly †¢ Or can be used as 16 bit register pairs – BC, DE, HL †¢ H L can be used as a data pointer (holds memory address) – Special Purpose Registers †¢ Accumulator (8 bit register) – Store 8 bit data – Store the result of an operation – Store 8 bit data during I/O transfer Accumulator Fla gs B C D E H L Program Counter Stack Pointer Address 6 8 Data †¢ Flag Register – 8 bit register – shows the status of the microprocessor before/after an operation – S (sign flag), Z (zero flag), AC (auxillary carry flag), P (parity flag) CY (carry flag) D7 S D6 Z D5 X D4 AC D3 X D2 P D1 X D0 CY – Sign Flag †¢ Used for indicating the sign of the data in the accumulator †¢ The sign flag is set if negative (1 – negative) †¢ The sign flag is reset if positive (0 –positive) †¢ Zero Flag – Is set if result obtained after an operation is 0 – Is set following an increment or decrement operation of that register 10110011 + 01001101 ————–1 00000000 †¢ Carry Flag Is set if there is a carry or borrow from arithmetic operation 1011 0101 + 0110 1100 ————–Carry 1 0010 0001 1011 0101 – 1100 1100 ————–Bo rrow 1 1110 1001 †¢ Auxillary Carry Flag – Is set if there is a carry out of bit 3 †¢ Parity Flag – Is set if parity is even – Is cleared if parity is odd The Internal Architecture †¢ We have already discussed the general purpose registers, the Accumulator, and the flags. †¢ The Program Counter (PC) – This is a register that is used to control the sequencing of the execution of instructions. – This register always holds the address of the next instruction. Since it holds an address, it must be 16 bits wide. The Internal Architecture †¢ The Stack pointer – The stack pointer is also a 16-bit register that is used to point into memory. – The memory this register points to is a special area called the stack. – The stack is an area of memory used to hold data that will be retreived soon. – The stack is usually accessed in a Last In First Out (LIFO) fashion. Non Programmable Registers †¢ Instructi on Register Decoder – Instruction is stored in IR after fetched by processor – Decoder decodes instruction in IR Internal Clock generator – 3. 125 MHz internally – 6. 5 MHz externally The Address and Data Busses †¢ The address bus has 8 signal lines A8 – A15 which are unidirectional. †¢ The other 8 address bits are multiplexed (time shared) with the 8 data bits. – So, the bits AD0 – AD7 are bi-directional and serve as A0 – A7 and D0 – D7 at the same time. †¢ During the execution of the instruction, these lines carry the address bits during the early part, then during the late parts of the execution, they carry the 8 data bits. – In order to separate the address from the data, we can use a latch to save the value before the function of the bits changes. Demultiplexing AD7-AD0 From the above description, it becomes obvious that the AD7– AD0 lines are serving a dual purpose and that they need t o be demultiplexed to get all the information. – The high order bits of the address remain on the bus for three clock periods. However, the low order bits remain for only one clock period and they would be lost if they are not saved externally. Also, notice that the low order bits of the address disappear when they are needed most. – To make sure we have the entire address for the full three clock cycles, we will use an external latch to save the value of AD7– AD0 when it is carrying the address bits. We use the ALE signal to enable this latch. Demultiplexing AD7-AD0 8085 A15-A8 ALE AD7-AD0 Latch A7- A0 D7- D0 – Given that ALE operates as a pulse during T1, we will be able to latch the address. Then when ALE goes low, the address is saved and the AD7– AD0 lines can be used for their purpose as the bi-directional data lines. Demultiplexing the Bus AD7 – AD0 †¢ †¢ †¢ †¢ The high order address is placed on the address bus and hold for 3 clk periods, The low order address is lost after the first clk period, this address needs to be hold however we need to use latch The address AD7 – AD0 is connected as inputs to the latch 74LS373. The ALE signal is connected to the enable (G) pin of the latch and the OC – Output control – of the latch is grounded The Overall Picture †¢ Putting all of the concepts together, we get: A15- A10 Chip Selection Circuit 8085 A15-A8 ALE AD7-AD0 Latch CS A9- A0 A7- A0 1K Byte Memory Chip WR RD IO/M D7- D0 RD WR Introduction to 8085 Instructions The 8085 Instructions – Since the 8085 is an 8-bit device it can have up to 28 (256) instructions. †¢ However, the 8085 only uses 246 combinations that represent a total of 74 instructions. – Most of the instructions have more than one format. These instructions can be grouped into five different groups: †¢ †¢ †¢ †¢ †¢ Data Transfer Operations Arithmetic Operations Logic Operations Branch Operations Machine Control Operations Instruction and Data Formats †¢ Each instruction has two parts. – The first part is the task or operation to be performed. †¢ This part is calle d the â€Å"opcode† (operation code). – The second part is the data to be operated on †¢ Called the â€Å"operand†. Data Transfer Operations – These operations simply COPY the data from the source to the destination. – MOV, MVI, LDA, and STA – They transfer: †¢ †¢ †¢ †¢ Data between registers. Data Byte to a register or memory location. Data between a memory location and a register. Data between an IO Device and the accumulator. – The data in the source is not changed. The LXI instruction †¢ The 8085 provides an instruction to place the 16-bit data into the register pair in one step. †¢ LXI Rp, (Load eXtended Immediate) – The instruction LXI B 4000H will place the 16-bit number 4000 into the register pair B, C. †¢ The upper two digits are placed in the 1st register of the pair and the lower two digits in the 2nd . B 40 00 C LXI B 40 00H The Memory â€Å"Register† Most of the instructions of the 8085 can use a memory location in place of a register. – The memory location will become the â€Å"memory† register M. †¢ MOV M B – copy the data from register B into a memory location. – Which memory location? †¢ The memory location is identified by the contents of the HL register pair. – The 16-bit co ntents of the HL register pair are treated as a 16-bit address and used to identify the memory location. Using the Other Register Pairs – There is also an instruction for moving data from memory to the accumulator without disturbing the contents of the H and L register. †¢ LDAX Rp (LoaD Accumulator eXtended) Copy the 8-bit contents of the memory location identified by the Rp register pair into the Accumulator. – This instruction only uses the BC or DE pair. – It does not accept the HL pair. Indirect Addressing Mode †¢ Using data in memory directly (without loading first into a Microprocessor’s register) is called Indirect Addressing. †¢ Indirect addressing uses the data in a register pair as a 16-bit address to identify the memory location being accessed. – The HL register pair is always used in conjunction with the memory register â€Å"M†. – The BC and DE register pairs can be used to load data into the Accumultor usi ng indirect addressing. Arithmetic Operations – Addition (ADD, ADI): – Any 8-bit number. – The contents of a register. – The contents of a memory location. †¢ Can be added to the contents of the accumulator and the result is stored in the accumulator. – Subtraction (SUB, SUI): – Any 8-bit number – The contents of a register – The contents of a memory location †¢ Can be subtracted from the contents of the accumulator. The result is stored in the accumulator. Arithmetic Operations Related to Memory †¢ These instructions perform an arithmetic operation using the contents of a memory location while they are still in memory. ADD – SUB – INR M M M / DCR M †¢ Add the contents of M to the Accumulator †¢ Sub the contents of M from the Accumulator †¢ Increment/decrement the contents of the memory location in place. – All of these use the contents of the HL register pair to identify the memory location being used . Arithmetic Operations – Increment (INR) and Decrement (DCR): †¢ The 8-bit contents of any memory location or any register can be directly incremented or decremented by 1. †¢ No need to disturb the contents of the accumulator. Manipulating Addresses †¢ Now that we have a 16-bit address in a register pair, how do we manipulate it? It is possible to manipulate a 16-bit address stored in a register pair as one entity using some special instructions. †¢ INX Rp †¢ DCX Rp (Increment the 16-bit number in the register pair) (Decrement the 16-bit number in the register pair) – The register pair is incremented or decremented as one entity. No need to worry about a carry from the lower 8-bits to the upper. It is taken care of automatically. Logic Operations †¢ These instructions perform logic operations on the contents of the accumulator. – ANA, ANI, ORA, ORI, XRA and XRI †¢ Source: Accumulator and – An 8-bit number – The c ontents of a register – The contents of a memory location Destination: Accumulator ANA R/M ANI # ORA ORI XRA XRI R/M # R/M # AND Accumulator With Reg/Mem AND Accumulator With an 8-bit number OR Accumulator With Reg/Mem OR Accumulator With an 8-bit number XOR Accumulator With Reg/Mem XOR Accumulator With an 8-bit number Logic Operations – Complement: †¢ 1’s complement of the contents of the accumulator. CMA No operand Additional Logic Operations †¢ Rotate – Rotate the contents of the accumulator one position to the left or right. – RLC – RAL – RRC – RAR Rotate the accumulator left. Bit 7 goes to bit 0 AND the Carry flag. Rotate the accumulator left through the carry. Bit 7 goes to the carry and carry goes to bit 0. Rotate the accumulator right. Bit 0 goes to bit 7 AND the Carry flag. Rotate the accumulator right through the carry. Bit 0 goes to the carry and carry goes to bit 7. RLC vs. RLA Carry Flag †¢ RLC 7 6 5 4 3 2 1 0 Accumulator Carry Flag †¢ RAL 7 6 5 4 3 2 1 0 Accumulator Logical Operations †¢ Compare †¢ Compare the contents of a register or memory location with the contents of the accumulator. – CMP R/M Compare the contents of the register or memory location to the contents of the accumulator. Compare the 8-bit number to the contents of the accumulator. CPI # †¢ The compare instruction sets the flags (Z, Cy, and S). †¢ The compare is done using an internal subtraction that does not change the contents of the accumulator. A – (R / M / #) Branch Operations †¢ Two types: – Unconditional branch. †¢ Go to a new location no matter what. – Conditional branch. †¢ Go to a n ew location if the condition is true. Unconditional Branch – JMP Address †¢ Jump to the address specified (Go to). – CALL Address †¢ Jump to the address specified but treat it as a subroutine. – RET †¢ Return from a subroutine. – The addresses supplied to all branch operations must be 16-bits. Conditional Branch – Go to new location if a specified condition is met. †¢ JZ Address (Jump on Zero) – Go to address specified if the Zero flag is set. †¢ JNZ Address (Jump on NOT Zero) – Go to address specified if the Zero flag is not set. †¢ JC Address (Jump on Carry) – Go to the address specified if the Carry flag is set. †¢ JNC Address (Jump on No Carry) – Go to the address specified if the Carry flag is not set. †¢ JP †¢ JM Address (Jump on Plus) Address (Jump on Minus) – Go to the address specified if the Sign flag is not set – Go to the address specified if the Sign flag is set. Machine Control – HLT †¢ Stop executing the program. – NOP †¢ No operation †¢ Exactly as it says, do nothing. †¢ Usually used for delay or to replace instructions during debugging. Operand Types †¢ There are different ways for specifying the operand: – There may not be an operand (implied operand) †¢ CMA – The operand may be an 8-bit number (immediate data) †¢ ADI 4FH – The operand may be an internal register (register) †¢ SUB B – The operand may be a 16-bit address (memory address) †¢ LDA 4000H Instruction Size †¢ Depending on the operand type, the instruction may have different sizes. It will occupy a different number of memory bytes. – Typically, all instructions occupy one byte only. – The exception is any instruction that contains immediate data or a memory address. †¢ Instructions that include immediate data use two bytes. – One for the opcode and the other for the 8-bit data. †¢ Instructions that include a memory address occupy three bytes. – One for the opcode, and the other two for the 16-bit address. Instruction with Immediate Date †¢ Operation: Load an 8-bit number into the accumulator. – MVI A, 32 †¢ Operation: MVI A †¢ Operand: The number 32 †¢ Binary Code: 0011 1110 3E 1st byte. 011 0010 32 2nd byte. Instruction with a Memory Address †¢ Operation: go to address 2085. – Instruction: JMP 2085 †¢ Opcode: JMP †¢ Operand: 2085 †¢ Binary code: 1100 0011 C3 1000 0101 85 0010 0000 20 1st byte. 2nd byte 3rd byte Addressing Modes †¢ The microprocessor has different w ays of specifying the data for the instruction. These are called â€Å"addressing modes†. †¢ The 8085 has four addressing modes: – – – – Implied Immediate Direct Indirect CMA MVI B, 45 LDA 4000 LDAX B †¢ Load the accumulator with the contents of the memory location whose address is stored in the register pair BC). Data Formats In an 8-bit microprocessor, data can be represented in one of four formats: †¢ †¢ †¢ †¢ ASCII BCD Signed Integer Unsigned Integer. – It is important to recognize that the microprocessor deals with 0’s and 1’s. †¢ It deals with values as strings of bits. †¢ It is the job of the user to add a meaning to these strings. Data Formats †¢ Assume the accumulator contains the following value: 0100 0001. – There are four ways of reading this value: †¢ It is an unsigned integer expressed in binary, the equivalent decimal number would be 65. †¢ It is a num ber expressed in BCD (Binary Coded Decimal) format. That would make it, 41. It is an ASCII representation of a letter. That would make it the letter A. †¢ It is a string of 0’s and 1’s where the 0th and the 6th bits are set to 1 while all other bits are set to 0. ASCII stands for American Standard Code for Information Interchange. Counters Time Delays Counters †¢ A loop counter is set up by loading a register with a certain value †¢ Then using the DCR (to decrement) and INR (to increment) the contents of the register are updated. †¢ A loop is set up with a conditional jump instruction that loops back or not depending on whether the count has reached the termination count. Counters †¢ The operation of a loop counter can be described using the following flowchart. Initialize Body of loop Update the count No Is this Final Count? Yes Sample ALP for implementing a loop Using DCR instruction MVI C, 15H LOOP DCR C JNZ LOOP Using a Register Pair as a Loop Counter †¢ Using a single register, one can repeat a loop for a maximum count of 255 times. †¢ It is possible to increase this count by using a register pair for the loop counter instead of the single register. – A minor problem arises in how to test for the final count since DCX and INX do not modify the flags. However, if the loop is looking for when the count becomes zero, we can use a small trick by ORing the two registers in the pair and then checking the zero flag. Using a Register Pair as a Loop Counter †¢ The following is an example of a loop set up with a register pair as the loop counter. LXI B, 1000H LOOP DCX B MOV A, C ORA B JNZ LOOP Delays †¢ It was shown in Chapt er 2 that each instruction passes through different combinations of Fetch, Memory Read, and Memory Write cycles. †¢ Knowing the combinations of cycles, one can calculate how long such an instruction would require to complete. The table in Appendix F of the book contains a column with the title B/M/T. – B for Number of Bytes – M for Number of Machine Cycles – T for Number of T-State. Delays †¢ Knowing how many T-States an instruction requires, and keeping in mind that a T-State is one clock cycle long, we can calculate the time using the following formula: Delay = No. of T-States / Frequency †¢ For example a â€Å"MVI† instruction uses 7 T-States. Therefore, if the Microprocessor is running at 2 MHz, the instruction would require 3. 5  µSeconds to complete. Delay loops †¢ We can use a loop to produce a certain amount of time delay in a program. The following is an example of a delay loop: MVI C, FFH LOOP DCR C JNZ LOOP 7 T-States 4 T- States 10 T-States †¢ The first instruction initializes the loop counter and is executed only once requiring only 7 T-States. †¢ The following two instructions form a loop that requires 14 T-States to execute and is repeated 255 times until C becomes 0. Delay Loops (Contd. ) †¢ We need to keep in mind though that in the last iteration of the loop, the JNZ instruction will fail and require only 7 T-States rather than the 10. †¢ Therefore, we must deduct 3 T-States from the total delay to get an accurate delay calculation. To calculate the delay, we use the following formula: Tdelay = TO + TL – Tdelay = total delay – TO = delay outside the loop – TL = delay of the loop †¢ TO is the sum of all delays outside the loop. Delay Loops (Contd. ) †¢ Using these formulas, we can calculate the time delay for the previous example: †¢ TO = 7 T-States – Delay of the MVI instruction †¢ TL = (14 X 255) – 3 = 3567 T-States â⠂¬â€œ 14 T-States for the 2 instructions repeated 255 times (FF16 = 25510) reduced by the 3 T-States for the final JNZ. Using a Register Pair as a Loop Counter †¢ Using a single register, one can repeat a loop for a maximum count of 255 times. It is possible to increase this count by using a register pair for the loop counter instead of the single register. – A minor problem arises in how to test for the final count since DCX and INX do not modify the flags. – However, if the loop is looking for when the count becomes zero, we can use a small trick by ORing the two registers in the pair and then checking the zero flag. Using a Register Pair as a Loop Counter †¢ The following is an example of a delay loop set up with a register pair as the loop counter. LXI B, 1000H LOOP DCX B MOV A, C ORA B JNZ LOOP 10 T-States 6 T-States 4 T-States 4 T-States 10 T-States Using a Register Pair as a Loop Counter †¢ Using the same formula from before, we can calculate: †¢ TO = 10 T-States – The delay for the LXI instruction †¢ TL = (24 X 4096) – 3 = 98301 T- States – 24 T-States for the 4 instructions in the loop repeated 4096 times (100016 = 409610) reduced by the 3 TStates for the JNZ in the last iteration. Nested Loops †¢ Nested loops can be easily setup in Assembly language by using two registers for the two loop counters and updating the right register in the right loop. – In the figure, the body of loop2 can be before or after loop1. Initialize loop 2 Body of loop 2 Initialize loop 1 Body of loop 1 Update the count1 No Is this Final Count? Yes Update the count 2 No Is this Final Count? Yes Nested Loops for Delay †¢ Instead (or in conjunction with) Register Pairs, a nested loop structure can be used to increase the total delay produced. MVI B, 10H LOOP2 MVI C, FFH LOOP1 DCR C JNZ LOOP1 DCR B JNZ LOOP2 7 T-States 7 T-States 4 T-States 10 T-States 4 T-States 10 T-States Delay Calculation of Nested Loops †¢ The calculation remains the same except that it the formula must be applied recursively to each loop. Start with the inner loop, then plug that delay in the calculation of the outer loop. †¢ Delay of inner loop – TO1 = 7 T-States †¢ MVI C, FFH instruction – TL1 = (255 X 14) – 3 = 3567 T-States †¢ 14 T-States for the DCR C and JNZ instructions repeated 255 Delay Calculation of Nested Loops †¢ Delay of outer loop – TO2 = 7 T-States †¢ MVI B, 10H instruct ion – TL1 = (16 X (14 + 3574)) – 3 = 57405 T-States †¢ 14 T-States for the DCR B and JNZ instructions and 3574 T-States for loop1 repeated 16 times (1016 = 1610) minus 3 for the final JNZ. – TDelay = 7 + 57405 = 57412 T-States †¢ Total Delay – TDelay = 57412 X 0. 5  µSec = 28. 06 mSec Increasing the delay †¢ The delay can be further increased by using register pairs for each of the loop counters in the nested loops setup. †¢ It can also be increased by adding dummy instructions (like NOP) in the body of the loop. Timing Diagram Representation of Various Control signals generated during Execution of an Instruction. Following Buses and Control Signals must be shown in a Timing Diagram: †¢Higher Order Address Bus. †¢Lower Address/Data bus †¢ALE †¢RD †¢WR †¢IO/M Timing Diagram Instruction: A000h MOV A,B Corresponding Coding: A000h 78 Timing Diagram Instruction: A000h MOV A,B Corresponding Coding: A000h 78 OFC 8085 Memory Timing Diagram Instruction: A000h MOV A,B 00h T1 T2 T3 T4 A0h A15- A8 (Higher Order Address bus) Corresponding Coding: A000h 78 78h ALE RD OFC WR 8085 Memory IO/M Op-code fetch Cycle Timing Diagram Instruction: A000h MVI A,45h Corresponding Coding: A000h A001h 3E 45 Timing Diagram Instruction: A000h MVI A,45h OFC MEMR Corresponding Coding: A000h A001h 3E 45 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h A0h A15- A8 (Higher Order Address bus) 00h 3Eh 01h 45h DA7-DA0 (Lower order address/data Bus) Instruction: A000h MVI A,45h Corresponding Coding: A000h A001h 3E 45 WR RD ALE IO/M Op-Code Fetch Cycle Memory Read Cycle Timing Diagram Instruction: A000h LXI A,FO45h Corresponding Coding: A000h A001h A002h 21 45 F0 Timing Diagram Instruction: A000h LXI A,FO45h OFC MEMR MEMR Corresponding Coding: A000h A001h A002h 21 45 F0 8085 Memory Timing Diagram Op-Code Fetch Cycle Memory Read Cycle Memory Read Cycle T1 T2 T3 T4 T5 T6 T7 T8 T9 T10 A0h A0h A0h A15- A8 (Higher Order Address bus) 00h 21h 01h 45h 02h F0h DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Timing Diagram Instruction: A000h MOV A,M Corresponding Coding: A000h 7E Timing Diagram Instruction: A000h MOV A,M OFC MEMR Corresponding Coding: A000h 7E 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h Content Of Reg H A15- A8 (Higher Order Address bus) Instruction: A000h MOV A,M Corresponding Coding: A000h 7E 00h 7Eh L Reg Content Of M DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Op-Code Fetch Cycle Memory Read Cycle Timing Diagram Instruction: A000h MOV M,A Corresponding Coding: A000h 77 Timing Diagram Instruction: A000h MOV M,A OFC MEMW Corresponding Coding: A000h 77 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h Content Of Reg H A15- A8 (Higher Order Address bus) Instruction: A000h MOV M,A Corresponding Coding: A000h 77 00h 7Eh L Reg Content of Reg A DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Op-Code Fetch Cycle Memory Write Cycle Chapter 9 Stack and Subroutines The Stack †¢ The stack is an area of memory identified by the programmer for temporary storage of information. †¢ The stack is a LIFO structure. – Last In First Out. †¢ The stack normally grows backwards into memory. – In other words, the programmer defines the bottom of the stack and the stack grows up into reducing address range. The Stack grows backwards into memory Memory Bottom of the Stack The Stack Given that the stack grows backwards into memory, it is customary to place the bottom of the stack at the end of memory to keep it as far away from user programs as possible. †¢ In the 8085, the stack is defined by setting the SP (Stack Pointer) register. LXI SP, FFFFH †¢ This sets the Stack Pointer to location FFFFH (end of memory fo r the 8085). Saving Information on the Stack †¢ Information is saved on the stack by PUSHing it on. – It is retrieved from the stack by POPing it off. †¢ The 8085 provides two instructions: PUSH and POP for storing information on the stack and retrieving it back. – Both PUSH and POP work with register pairs ONLY. The PUSH Instruction †¢ PUSH B – Decrement SP – Copy the contents of register B to the memory location pointed to by SP – Decrement BSP C F3 12 – Copy the contents of register C to the memory location pointed to by SP F3 FFFB FFFC FFFD FFFE FFFF 12 SP The POP Instruction †¢ POP D – Copy the contents of the memory location pointed to by the SP to register E – Increment SP – Copy the contents of the memory location D E F3 12 pointed to by the SP to register D – Increment SP F3 SP FFFB FFFC FFFD FFFE FFFF 12 Operation of the Stack †¢ During pushing, the stack operates in a â€Å"decrement then store† style. The stack pointer is decremented first, then the information is placed on the stack. †¢ During poping, the stack operates in a â€Å"use then increment† style. – The information is retrieved from the top of the the stack and then the pointer is incremented. †¢ The SP pointer always p oints to â€Å"the top of the stack†. LIFO †¢ The order of PUSHs and POPs must be opposite of each other in order to retrieve information back into its original location. PUSH B PUSH D †¦ POP D POP B The PSW Register Pair †¢ The 8085 recognizes one additional register pair called the PSW (Program Status Word). This register pair is made up of the Accumulator and the Flags registers. †¢ It is possible to push the PSW onto the stack, do whatever operations are needed, then POP it off of the stack. – The result is that the contents of the Accumulator and the status of the Flags are returned to what they were before the operations were executed. Subroutines †¢ A subroutine is a group of instructions that will be used repeatedly in different locations of the program. – Rather than repeat the same instructions several times, they can be grouped into a subroutine that is called from the different locations. In Assembly language, a subroutine ca n exist anywhere in the code. – However, it is customary to place subroutines separately from the main program. Subroutines †¢ The 8085 has two instructions for dealing with subroutines. – The CALL instruction is used to redirect program execution to the subroutine. – The RTE insutruction is used to return the execution to the calling routine. The CALL Instruction †¢ CALL 4000H – Push the address of the instruction immediately following the CALL onto the stack 2000 CALL 4000 2003 counter – Load the program PC 2 0 0 3with the 16-bit address supplied with the CALL instruction. FFFB FFFC FFFD FFFE FFFF 3 20 SP The RTE Instruction †¢ RTE – Retrieve the return address from the top of the stack – Load the program counter with the return address. 2003 PC 4014 4015 †¦ RTE FFFB FFFC FFFD FFFE FFFF 03 20 SP Cautions †¢ The CALL instruction places the return address at the two memory locations immediately before where th e Stack Pointer is pointing. – You must set the SP correctly BEFORE using the CALL instruction. †¢ The RTE instruction takes the contents of the two memory locations at the top of the stack and uses these as the return address. – Do not modify the stack pointer in a subroutine. You will loose the return address. Passing Data to a Subroutine †¢ In Assembly Language data is passed to a subroutine through registers. – The data is stored in one of the registers by the calling program and the subroutine uses the value from the register. †¢ The other possibility is to use agreed upon memory locations. – The calling program stores the data in the memory location and the subroutine retrieves the data from the location and uses it. Call by Reference and Call by Value †¢ If the subroutine performs operations on the contents of the registers, then these modifications will be transferred back to the calling program upon returning from a subroutine. Call by reference †¢ If this is not desired, the subroutine should PUSH all the registers it needs on the stack on entry and POP them on return. – The original values are restored before execution returns to the calling program. Cautions with PUSH and POP †¢ PUSH and POP should be used in opposite order. †¢ T here has to be as many POP’s as there are PUSH’s. – If not, the RET statement will pick up the wrong information from the top of the stack and the program will fail. †¢ It is not advisable to place PUSH or POP inside a loop. Conditional CALL and RTE Instructions †¢ The 8085 supports conditional CALL and conditional RTE instructions. The same conditions used with conditional JUMP instructions can be used. – – – – – CC, call subroutine if Carry flag is set. CNC, call subroutine if Carry flag is not set RC, return from subroutine if Carry flag is set RNC, return from subroutine if Carry flag is not set Etc. A Proper Subroutine †¢ According to Software Engineering practices, a proper subroutine: – Is only entered with a CALL and exited with an RTE – Has a single entry point †¢ Do not use a CALL statement to jump into different points of the same subroutine. – Has a single exit point †¢ There should be one return statement from any subroutine. Following these rules, there should not be any confusion with PUSH and POP usage. The Design and Operation of Memory Memory in a microprocessor system is where information (data and instructions) is kept. It can be classified into two main types: ? ? Main memory (RAM and ROM) Storage memory (Disks , CD ROMs, etc. ) The simple view of RAM is that it is made up of registers that are made up of flip-flops (or memory elements). ? ROM on the other hand uses diodes instead of the flip-flops to permanently hold the information. The number of flip-flops in a â€Å"memory register† determines the size of the memory word. Accessing Information in Memory For the microprocessor to access (Read or Write) information in memory (RAM or ROM), it needs to do the following: Select the right memory chip (using part of the address bus). Identify the memory location (using the rest of the address bus). Access the data (using the data bus). 2 Tri-State Buffers An important circuit element that is used extensively in memory. This buffer is a logic circuit that has three states: Logic 0, logic1, and high impedance. When this circuit is in high impedance mode it looks as if it is disconnected from the output completely. The Output is Low The Output is High High Impedance 3 The Tri-State Buffer This circuit has two inputs and one output. The first input behaves like the normal input for the circuit. The second input is an â€Å"enable†. ? ? If it is set high, the output follows the proper circuit behavior. If it is set low, the output looks like a wire connected to nothing. Output Input OR Input Output Enable Enable 4 The Basic Memory Element The basic memory element is similar to a D latch. This latch has an input where the data comes in. It has an enable input and an output on which data comes out. Data Input D Data Output Q Enable EN 5 The Basic Memory Element However, this is not safe. Data is always present on the input and the output is always set to the contents of the latch. To avoid this, tri-state buffers are added at the input and output of the latch. Data Input D Data Output Q RD Enable EN WR 6 The Basic Memory Element The WR signal controls the input buffer. The bar over WR means that this is an active low signal. So, if WR is 0 the input data reaches the latch input. If WR is 1 the input of the latch looks like a wire connected to nothing. The RD signal controls the output in a similar manner. A Memory â€Å"Register† If we take four of these latches and connect them together, we would have a 4-bit memory register I0 WR I1 I2 I3 D Q EN EN RD D Q EN D Q EN D Q EN O0 O1 O2 O3 8 A group of memory registers D0 o D1 o o D2 o D3 WR D EN Q D EN Q D EN Q D EN Q D Q D EN Q D EN Q D EN Q Expanding on this scheme to add more memory registers we get the diagram to the right. EN D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q o o o o RD D0 D1 D2 9 D3 Externally Initiated Operations External devices can initiate (start) one of the 4 following operations: Reset ? All operations are stopped and the program counter is reset to 0000. The microprocessor’s operations are interrupted and the microprocessor executes what is called a â€Å"service routine†. This routine â€Å"handles† the interrupt, (perform the necessary operations). Then the microprocessor returns to its previous operations and continues. Interrupt ? ? 10 A group of Memory Registers If we represent each memory location (Register) as a block we get the following I0 I1 I2 I3 WR EN0 EN1 EN2 EN3 RD O0 Input Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 Output Buffers O1 O2 O3 11 The Design of a Memory Chip Using the RD and WR controls we can determine the direction of flow either into or out of memory. Then using the appropriate Enable input we enable an individual memory register. What we have just designed is a memory with 4 locations and each location has 4 elements (bits). This memory would be called 4 X 4 [Number of location X number of bits per location]. 12 The Enable Inputs How do we produce these enable line? Since we can never have more than one of these enables active at the same time, we can have them encoded to reduce the number of lines coming into the chip. These encoded lines are the address lines for memory. 13 The Design of a Memory Chip So, the previous diagram would now look like the following: I I I I 0 1 2 3 WR A d d r e s s D e c o d e r Input Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 Output Buffers A1 A0 RD O0 O1 O2 O3 14 The Design of a Memory Chip Since we have tri-state buffers on both the inputs and outputs of the flip flops, we can actually use one set of pins only. Input Buffers WR A1 A0 A D The chip Memory Reg. now look likeDthis: would 0 d e 0 D0 A1 A0 D1 D2 D3 d r e s s c o d e r Memory Reg. 1 Memory Reg. 2 Memory Reg. Output Buffers D1 D2 D3 RD RD WR 15 The steps of writing into Memory What happens when the programmer issues the STA instruction? The microprocessor would turn on the WR control (WR = 0) and turn off the RD control (RD = 1). The address is applied to the address decoder which generates a single Enable signal to turn on only one of the memory registers. The data is then applied on th e data lines and it is stored into the enabled register. 16 Dimensions of Memory Memory is usually measured by two numbers: its length and its width (Length X Width). ? ? The length is the total number of locations. The width is the number of bits in each location. The length (total number of locations) is a function of the number of address lines. # of memory locations = 2( # of address lines) 210 = 1024 locations (1K) ? So, a memory chip with 10 address lines would have Looking at it from the other side, a memory chip with 4K locations would need ? Log2 4096=12 address lines 17 The 8085 and Memory The 8085 has 16 address lines. That means it can address 216 = 64K memory locations. Then it will need 1 memory chip with 64 k locations, or 2 chips with 32 K in each, or 4 with 16 K each or 16 of the 4 K chips, etc. ow would we use these address lines to control the multiple chips? 18 Chip Select Usually, each memory chip has a CS (Chip Select) input. The chip will only work if an active signal is applied on that input. To allow the use of multiple chips in the make up of memory, we need to use a number of the address lines for the purpose of â€Å"chip selection†. These address lines are dec oded to generate the 2n necessary CS inputs for the memory chips to be used. 19 Chip Selection Example Assume that we need to build a memory system made up of 4 of the 4 X 4 memory chips we designed earlier. We will need to use 2 inputs and a decoder to identify which chip will be used at what time. The resulting design would now look like the one on the following slide. 20 Chip Selection Example RD WR D0 D1 RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS A0 A1 A2 A3 2 X4 Decoder 21 Memory Map and Addresses The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 0000 0000 EPROM 3FFF 4400 Address Range of EPROM Chip Address Range RAM 1 RAM 2 RAM 3 Address Range of 1st RAM Chip 5FFF 6000 Address Range of 2nd RAM Chip FFF 9000 A3FF A400 Address Range of 3rd RAM Chip RAM 4 F7FF FFFF Address Range of 4th RAM Chip 22 Address Range of a Memory Chip The address range of a particular chip is the list of all addresses that are mapped to the chip. An example for the address range and its relationship to the memory chips would be the Post Office Boxes in the post office. †¢ Each box has its uniq ue number that is assigned sequentially. (memory locations) †¢ The boxes are grouped into groups. (memory chips) †¢ The first box in a group has the number immediately after the last box in the previous group. 23 Address Range of a Memory Chip The above example can be modified slightly to make it closer to our discussion on memory. †¢ Let’s say that this post office has only 1000 boxes. †¢ Let’s also say that these are grouped into 10 groups of 100 boxes each. Boxes 0000 to 0099 are in group 0, boxes 0100 to 0199 are in group 1 and so on. We can look at the box number as if it is made up of two pieces: †¢ The group number and the box’s index within the group. †¢ So, box number 436 is the 36th box in the 4th group. The upper digit of the box number identifies the group and the lower two digits identify the box within the group. 24 The 8085 and Address Ranges The 8085 has 16 address lines. So, it can address a total of 64K memory locations. If we use memory chips with 1K locations each, then we will need 64 such chips. The 1K memory chip needs 10 address lines to uniquely identify the 1K locations. (log21024 = 10) That leaves 6 address lines which is the exact number needed for selecting between the 64 different chips (log264 = 6). 25 The 8085 and Address Ranges Now, we can break up the 16-bit address of the 8085 into two pieces: A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0 Chip Selection Location Selection within the Chip Depending on the combination on the address lines A15 – A10 , the address range of the specified chip is determined. 26 Chip Select Example A chip that uses the combination A15 – A10 = 001000 would have addresses that range from 2000H to 23FFH. Keep in mind that the 10 address lines on the chip gives a range of 00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the chips. The memory chip in this example would require the following circuit on its chip select input: A 10 A 11 A 12 A 13 A 14 A 15 CS 27 Chip Select Example If we change the above combination to the following: A 10 A 11 A 12 A 13 A 14 A 15 CS Now the chip would have addresses ranging from: 2400 to 27FF. Changing the combination of the address bits connected to the chip select changes the address range for the memory chip. 28 Chip Select Example To illustrate this with a picture: ? ? in the first case, the memory chip occupies the piece of the memory map identified as before. In the second case, it occupies the piece identified as after. Before After 0000 2000 23FF 2400 27FF 0000 FFFF FFFF 29 High-Order vs. Low-Order Address Lines The address lines from a microprocessor can be classified into two types: High-Order ? Low-Order ? How to cite Central Processing Unit and Memory Location, Essay examples

Saturday, April 25, 2020

The Rise And Decline Of The Creoles free essay sample

Of Color Essay, Research Paper The Rise and Decline of the Creoles of Color The Creoles of colour made many great paces in shuting the societal spread between inkinesss and Whites. This they achieved at a clip when most, if non all, basic freedoms were being denied to nonwhites. As a group, these Creoles achieved a great sum of success. many acquired huge lucks, having plantations and slaves. What happened to this group of people during the class of history? When American civilization began to take the topographic point of Gallic civilization in Louisiana, the Creoles of colour lost their particular position. Their civilization was in danger of being forgotten. It is difficult to give a specific definition to the Creoles of colour. They are a people of assorted cultural heritage. Today there is a quandary over what constitutes a modern Creole of colour. During the 18th and 19th centuries nevertheless, the definition was fundamentally ; a category of people of Gallic or Spanish blood, assorted with the blood of Africans or Santo Domingos. We will write a custom essay sample on The Rise And Decline Of The Creoles or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Their households had been free for coevalss. This group is portion of a larger societal order known as names de couleur libre, or the free people of colour. The Creoles of colour made up a 3rd caste in the ante-bellum South. They stood between, or instead apart, from both the inkinesss and the Whites. They identified more with the upper caste, though they shared the humiliation of being associated with the enslaved. This group was alone to Louisiana. Before the civil war the Creoles of colour existed as a separate category. The mean white accepted this in-between bed of society and dealt easy with its members. This is the one exclusion in American history of an effort to harmonize a 3rd group particular position. Historically, in the United States a individual holding any Negro lineage has been considered a Negro. There is no ground why a individual with half of his lineage black and half white should be labeled as black. With equal logic that individual could be defined as white. The Creoles of colour overcame these labels, if merely for a short clip. Though the Creoles of colour had their ain particular position, they were by no agencies regarded as equal to Whites. There was a caste system for Creoles of African descent: Negro # 8211 ; Full Negro blood Sacatra # 8211 ; 7/8 Negro # 8211 ; 1/8 White Griffe # 8211 ; 3/4 Negro # 8211 ; 1/8 white Mulatto # 8211 ; 1/2 Negro # 8211 ; 1/2 White Quadroon # 8211 ; 1/4 Negro # 8211 ; 3/4 White Octoroon # 8211 ; 1/8 Negro # 8211 ; 7/8 White The grade of privledge received was dependent on this graduated table. In other words, the whiter a individual was, the more freedoms that individual had. Beginnings of the Creoles of Color There were free people of colour in Gallic colonial Louisiana every bit early as 1725. Some came from Santo Domingo and entered the settlement as free people. Others were former slaves who had been given freedom. In March of 1724, the authorities in France formulated a series of Torahs called the Code Noir, or Black Code. Though some fo the Torahs were meant to modulate the behavior of freed slaves, others were designed to protect them. Aothough there was an exclusion that said free pople of colour could non get married Whites, one of these Torahs granted free people of colour the same rights as any white citizen of Louisiana. When Louisiana was taken over by the Spanish, most of the free people of colour were upset. They were really proud to be Gallic and did non desire to be ruled by Spain. However, Spanish regulation proved to be favourable to them, as they did non hold to give up their Frnch civilization, and the prevailing linguistic communication in Louisiana continued to be Gallic. Under the Spanish government many slaves were freed. This was partially due to the fact that there was a deficiency of white European adult females in the settlement. Many Gallic and Spanish work forces took slaves as couples. It was really common for these work forces to liberate the slave adult females and the kids which resulted from Thursdaies relationships. After liberating the slaves the adult male would normally allow them some land and give them money to supply for the ileegitiamte household. These relationships were the beginnings of a patterns known as placage. Placage is a Franch word significance to be placed. Affluent Gallic gentleman would take the most beautiful light-skinned adult females of colour, normally quadroons or octoroons, and enter into an illicit relationship with them. These adult females were raised in celibacy and protected until they met with a suited |protectorX. From childhood these misss were trained in societal graces and Gallic manners. When they were old plenty, they were introduced into society at Quadroon Balls. These balls were glamourous, formal personal businesss where the affluent Gallic gentlemen went in the hopes of run intoing a beautiful Creole adult female. After the confederation was made, the twosome got together and agreed in a formal contract on the mode in which the adult female would be taken attention of. The adult female was normally given a gouse in which to populate and raise the kids that the coulple would finally hold. T hese adult females were normally taken really good attention of. They were given all right vesture, gems, and retainers. Placage was common pattern in New Orleans. It was rarer in the rural countries of Louisiana, nevertheless it ded occur. Basically it was accepted by the society and considered platitude. These adult females of colour lived as 2nd married womans to their white plantation owner |protectorsX. Through these relationships they gained wealth and regard. Their greatest hope was to hold kids who were light plenty to go through for white. Many adult females of colour preferable placage to relationships with work forces of their ain sort, which they thought were excessively restricting. Placage was non the lone manner in which Creoles of colour increased their population and advanced their wealth. In the rural backcountry placage was looked down upon. There, people were expected to hold a proper nuptials in a church. Standards for matrimony between Creoles of colour definetly involved skin colour. Marriages were usuallly arranged by the parents. They sought out parnters for their kids trusting to happen a lucifer who had the same shadiness, or sooner lighter, tegument. Sometimes there was a limited figure of Creole households of colour life in a rural country. This meant a deficiency of couples for the newest genteration. When this happened Creole work forces of colour were brought in from New Orleans. There were ever many who were willing to travel into the back state, live on a plantation, and get married a Creole adult female of colour. The population of Creoles of colour was becomming larger all the clip. Another manner in which Creole households grew was through the illicit kids of slaves and white plantation owners. Often, the male parents of these kids wanted to maneuver them off from confederations with laves. These male parents would liberate their kids and set up a matrimony with a Creole planter+s kid. The Rise of Creoles of Color Outside of Louisiana, when a slave was freed, they frequently found themselves with no land, no money, and no manner to gain a life. This left them in a state of affairs that was little better than bondage. In Louisiana nevertheless, there was a topographic point for freed slaves in society. When slaves were freed in Louisiana, they were frequently given some land and money. Under Spanish and Gallic regulation, free people of colour enjoyed many economic autonomies. They could get land grants, and many of them did. They farmed this land and profited from it. Finally many of these farms became plantations. These Creoles of colour became affluent, slave-owning plantation owners. The Creole household farms and plantations were normally larger than, or the same size as, those owned by Whites in the same country. The early harvests grown on these plantations were indigo, baccy, and sugar. These harvests finally gave manner to cotton. An mean Creole farm in the rural back state had about nine slaves. evidently, on a big plantation there would be many more slaves. As parents divided their retentions between legion offspring, there was an inevitiable diminution in the size of single plantations. Familiy was really of import to the Creoles of colour. It was common proctice for parents to give full platations to their kids as nuptials nowadayss. In their intervention of the slaves they owned, Thursday vitamin E Creoles of colour couldn+t win no affair what they did. They were criticized by Whites for being sort to thier slaves, every bit good as for being rough. As a regulation nevertheless, their slaves were treated merely every bit good as, if non better than, the mean white planter+s slaves. Creoles of colour were besides known to allow valued slaves freedom. Although each free individual of colour had a background that included bondage, the Creoles were non morally against it. Many Creoles were afraid that if all slaves were freed they would lose their particular position. Basically, they adopted the attitude of the larger socity in sing slaves. The bottom line was that slaves were an economic plus. The bulk of Creoles of colour did non ain plantations. Louisiana was alone in bring forthing many economic chances for free people of colour. In other countries white concern work forces had an antipathy to engaging nonwhites. This made it highly difficult for them to do a life. In New Orleans, the most typical ocuupations that free people of colour held were: seamster, Barber, carpenter, Mason, cigarmaker, drudge driver, and cobbler. The Decline of the Creoles of Color Early on on Torahs were passed curtailing the free people of colour. However, it was non until the Americans took over Louisiana that any of these Torahs truly took clasp. For illustration, Esteban Miro+s edict was passed in 1786. This was an effort to forestall placages. It ordered free adult females of colour in placages to happen new ways to back up themselves, or be expelled organize the settlement. It besides stated that free adult females of colour were to halt have oning so many gems. Form so on they were required to have on a tignon, a kerchief used as a headgear, as a symbol of their lower position. This edict was non truly obeyed. The tignon+s were made of silks and decked with gems. They were used by these adult females as a farther plus to their beauty. The placages continued, though in greater secretiveness. In 1803 the United States bought Louisiana from France. This proved to be the first in a series of events that would finally do the ruin of the Creoles of colour. After the Louisiana Purchase, Americans ppoured into the settlement and took over. This was a batch like takeng over a foreign state. Not merely was the Gallic civilization in danger, the civilization of the free people of colour was in danger of being wiped out all together. The Americans viewed all nonwhites as being portion of the same inferior group. The free people of colour had antecedently enjoyed many rights and ummunities. They besides expected the Americans to acknowledge their particular position. When Louisiana became a province, its fundamental law ignored all the freedoms that the free people of colour had been accustomed to. They were given no political rights at all. In an effort to stay a separate group, the Louisian free born people of colour began naming themselves Creoles. They insisted that others call them this every bit good. In response to the invasion of Americans in their place, the Creole community drew into itself. The Creoles refused to larn English. They held themselves distant signifier Whites and freshly freed work forces. By the 1840+s the figure of Creoles in Louisiana was reduced. Though the Creoles considered themselves a separate category, they suffered organize the general anti-colored feeling in the late 1830+s # 8211 ; 1840+s. There were Torahs bing passed which made it progressively more hard for them to populate in Louisiana. For examle, the Creoles of colour were barred from go toing publec schools, though they had to pay revenue enhancements for those schools. It became easier for them to go forth, instead than populate under a authorities that wouldn+t recongize their rights. Among the Creoles who stayed, their finding non to intermix into the society grew. In 1843 the first magazine of Hagiographas by Creoles was published. It was called L+Album Litteraire, and contained a aggregation of verse forms and short narratives. Armand Lanusse published a book of verse forms by Creoles. These plants were treasured by the Creoles of colour. The narratives and verse forms were memorized and cherished. At the oncoming of the Civil War many Creoles left for Haiti, where they would be recognized as a particular group. The Creoles who remained had assorted feelings abouut the Civil War. If the South won the war, the Creoles thought there was a opportunity of keeping thier separate category. If the the North won, the Creoles feared they would be lost in the rush of freed slaves. At the same clip there was hope that all people, black and white, would be treated the same. Until New Orleans fell to the Union ground forces, many Creoles had supported the South and given their adjutant in the war. The Creoles finally gravitiated to the North. This was because the South drove them to it. Laws had been passed necessitating free people of colour to hold a license to walk the streets. The Creoles loved the South, but the South seemed set on destructing them. Besides, the North offered the Creoles many promises. The most improtant one being, that with so many illiterate slaves being freed, the knowing Creoles would be awarded places of power. They would go leaders of the nonwhite population. After the war about all white Louisianians were deprived of their power because of their portion in the war. Positions of leading were abundant. In 1863, Lincoln said that all free people of colour who were intelligent and had fought on the Union side in the war should vote. By 1868, the offices of Lieutenant Governor and State Treasurer, among others, were held by Creoles. It was a brief period of equality and chance for people of colour. After a piece, the Whites who had supported the Confederacy were allowed to vote once more. They regained their places in the community. The anti-black feelings returned and the Creloses were included. It was a clip for the people of colour to pay for the shor t period of equality they had enjoyed. During this clip there were many vioulent Acts of the Apostless committed against people of colour. The Creoles still thought that they had a alone category, though they were seen as Negroes in the eyes of others. One bead of Negro blood made them black, when before one bead of white blood was plenty to allow them a small freedom. Bing black in the South at this clip was equal to holding no privileges at all. The populace schools which had been opened to them once more, were one time once more closed. Then came the Jim Crow Torahs, which made it progressively difficult for people of colour to populate. Discriminatory Torahs piled up on one another for a figure of old ages after 1900. Each one took more civil and economic rights off form the Creoles of colour every bit good as from non-Creole inkinesss. Since there was truly notheing they could make to better their state of affairs in Louisiana, many Creoles left the South. The Creoles who were light plenty passed into white society. After a while the Creoles of colour realized that they could non stay wholly separate from American society. They knew thsy would hold to alter in some ways in order to map in America. By the early yars of the 20th centry, they had stopped talking Gallic. Today, merely a few Gallic words remain in their address. Yet despited all the alterations, the Creoles of colour have maintined enough of their alone civilization to separate them organize other inkinesss. There is a batch of calamity involved in the sory of the Creoles of Color. They attained Civil rights about a century before the Civil Rights Movement in America. They came so close to accomplishing equality between inkinesss and Whites, merely to hold it all taken off from them. One wonders how the class of American history may hold changed if the brief period of chance that the Creoles enjoyed had been the tendency that the United Stated had followed from so on. Bibliography Mills, Gary B. The Forgotten People, Cane River+s Creoles of Color. Baton Rouge: Louisiana State University Press, 1977. Haskins, James. The Creoles of Color of New Orleans. New York: Thomas Y. Crowell Company, 1975. Dominguez, Virgina R, White By Definition, Social Classification in Creole Louisiana. New Brunswick, New Jersey: Rutgers University Press, 1986. Desdunes, Rudope Lucien. Our Peoples and Our History. Baton Rouge: Louisiana State University Press, 1973.