Character Translation Methods
|
|
|
- Nickolas Logan
- 9 years ago
- Views:
Transcription
1 Supplement to: Irvine, Kip R. Assembly Language for Intel-Based Computers, 4th Edition. This file may be duplicated or printed for classroom use, as long as the author name, book title, and copyright notice remain unchanged. Character Translation Methods One task that assembly language programs handle best is character translation. There are many computer applications for this. The rapidly expanding field of data encryption is one, where data files must be securely stored and transmitted between computers while their contents are kept secret. Another application is data communications, where keyboard and screen codes must be translated in order to emulate various terminals. Often, we need to translate characters from one encoding system to another from ASCII to EBCDIC, for example. A critical factor in each of these applications is speed, which just happens to be a feature of assembly language. The XLAT Instruction The XLAT instruction adds AL to EBX and uses the resulting offset to point to an entry in an 8- bit translate table. This table contains values that are substituted for the original value in AL. The byte in the table entry pointed to by EBX + AL is moved to AL. The syntax is XLAT [tablename] Tablename is optional because the table is assumed to be pointed to by EBX (or BX, in Realaddress mode). Therefore, be sure to load BX with the offset of the translate table before invoking XLAT. The flags are not affected by this instruction. The table can have a maximum of 256 entries, the same range of values possible in the 8-bit AL register. Example Let's store the characters representing all 16 hexadecimal digits in a table: table BYTE ' ABCDEF' The table contains the ASCII code of each hexadecimal digit. If we place 0Ah in AL with the thought of converting it to ASCII, we can set EBX to the table offset and invoke XLAT. The instruction adds EBX and AL, generating an effective address that points to the eleventh entry in the table. It then moves the contents of this table entry to A: mov al,0ah mov ebx,offset table xlat ; index value ; point to table ; AL = 41h, or 'A' (c) Pearson Education, 2003.
2 2 Character Translation Methods Character Filtering One of the best uses of XLAT is to filter out unwanted characters from a stream of text. Suppose we want to input a string of characters from the keyboard and echo only those with ASCII values from 32 to 127. We can set up a translate table, place a zero in each table position corresponding to an invalid character, and place 0FFh in each valid position: validchars BYTE 32 DUP(0) ; invalid chars: 0-31 BYTE 96 DUP(0FFh) ; valid chars: BYTE 128 DUP(0) ; invalid chars: The following Xlat.asm program includes code that inputs a series of characters and uses them to look up values in the validchars table: TITLE Character Filtering (Xlat.asm) ; This program filters input from the console ; by screening out all ASCII codes less than ; 32 or greater than 127. Uses INT 16h for ; direct keyboard input. INCLUDE Irvine32.inc INPUT_LENGTH = 20.data validchars BYTE 32 DUP(0) ; invalid chars: 0-31 BYTE 96 DUP(0FFh) ; valid chars: BYTE 128 DUP(0) ; invalid chars: code main PROC mov ebx,offset validchars mov ecx,input_length getchar: call ReadChar ; read character into AL mov dl,al ; save copy in DL xlat validchars ; look up char in AL or al,al ; invalid char? jz getchar ; yes: get another mov al,dl call WriteChar ; output character in AL loop getchar call Crlf exit main ENDP END main
3 3 If XLAT returns a value of zero in AL, we skip the character and jump back to the top of the loop. (When AL is ORed with itself, the Zero flag is set if AL equals 0). If the character is valid, 0FFh is returned in AL, and we call WriteChar to display the character in DL. Character Encoding The XLAT instruction provides a simple way to encode data so it cannot be read by unauthorized persons. When messages are transferred across telephone lines, for instance, encoding can be a way of preventing others from reading them. Imagine a table in which all the possible digits and letters have been rearranged. A program could read each character from standard input, use XLAT to look it up in a table, and write its encoded value to standard output. A sample table is as follows: codetable LABEL BYTE BYTE 48 DUP(0) BYTE ' ' ; ASCII codes BYTE 7 DUP (0) BYTE 'GVHZUSOBMIKPJCADLFTYEQNWXR' BYTE 6 DUP (0) BYTE 'gvhzusobmikpjcadlftyeqnwxr' BYTE 133 DUP(0) Certain ranges in the table are set to zeros; characters in these ranges are not translated. The $ character (ASCII 36), for example, is not translated because position 36 in the table contains the value 0. Sample Program Let s take a look at a character encoding program that encodes each character read from an input file. When running the program, one can redirect standard input from a file, using the < symbol. For example: encode < infile The program output appears on the screen. Output can also be redirect to a file: encode < infile > outfile The following example shows a line from an input file that has been encoded: This is a SECRET Message Ybmt mt g TUHFUY Juttgou (read from input file) (encoded output) The program cannot use the keyboard as the standard input device, because it quits looking for input as soon as the keyboard buffer is empty. The user would have to type fast enough to keep the keyboard buffer full. Given some time and effort, a simple encoding scheme like this can be broken. The easiest way to break the code is to gain access to the program itself and use it to encode a known message. But if you can prevent others from running the program, breaking the code takes more time. Another way to discourage code breaking is to constantly change the code. In World War
4 4 Character Translation Methods II, for example, pilots carried a code book for translating messages, so that message encryption could be varied on a day-to-day basis. TITLE Character Encoding Program (Encode.asm) ; This program reads an input file and encodes ; the output using the XLAT instruction. ; To run it, redirect input at the Command prompt: ; ; encode < input.txt ; ; Implemented as a 16-bit application because we can ; use INT 21h function 6 to input characters without ; waiting. See Section for details. ; Last update: 06/01/02 INCLUDE Irvine16.inc.data codetable LABEL BYTE BYTE 48 DUP(0) BYTE ' '; ASCII codes BYTE 7 DUP (0) BYTE 'GVHZUSOBMIKPJCADLFTYEQNWXR' BYTE 6 DUP (0) BYTE 'gvhzusobmikpjcadlftyeqnwxr' BYTE 133 DUP(0).code main PROC mov ax,@data mov ds,ax mov bx,offset codetable getchar: push bx mov ah,6 mov dl,0ffh int 21h pop bx jz quit mov dl,al xlat cmp al,0 je putchar mov dl,al ; input character, don't wait ; call DOS ; quit, no input waiting ; save char in DL ; translate the character ; translatable? ; no: write it as is ; yes: move new char to DL putchar:
5 5 mov al,dl call WriteChar jmp getchar ; character is in DL ; write AL to standard output ; get another char quit: exit main ENDP END main
6 6 Character Translation Methods
How To Use A Computer With A Screen On It (For A Powerbook)
page 44,100 TITLE ASMXMPLE Video equ 10h ;video functions interrupt number Keyboard equ 16h ;keyboard functions interrupt number DOS equ 21h ;call DOS interrupt number PrtSc equ 5h ;Print Screen Bios interrupt
8. MACROS, Modules, and Mouse
8. MACROS, Modules, and Mouse Background Macros, Modules and the Mouse is a combination of concepts that will introduce you to modular programming while learning how to interface with the mouse. Macros
Faculty of Engineering Student Number:
Philadelphia University Student Name: Faculty of Engineering Student Number: Dept. of Computer Engineering Final Exam, First Semester: 2012/2013 Course Title: Microprocessors Date: 17/01//2013 Course No:
Using Heap Allocation in Intel Assembly Language
Using Heap Allocation in Intel Assembly Language Copyright 2005, Kip R. Irvine. All rights reserved. Dynamic memory allocation is a feature we take for granted in high-level languages such as C++ and Java.
by Kip Irvine. Last update: 12/11/2003
Loading and Executing a Child Process by Kip Irvine. Last update: 12/11/2003 MS-DOS has always taken a fairly straightforward approach to loading and executing programs. From the start, it was designed
Computer Organization and Assembly Language
Computer Organization and Assembly Language Lecture 8 - Strings and Arrays Introduction We already know that assembly code will execute significantly faster than code written in a higher-level language
MACHINE ARCHITECTURE & LANGUAGE
in the name of God the compassionate, the merciful notes on MACHINE ARCHITECTURE & LANGUAGE compiled by Jumong Chap. 9 Microprocessor Fundamentals A system designer should consider a microprocessor-based
An Introduction to Assembly Programming with the ARM 32-bit Processor Family
An Introduction to Assembly Programming with the ARM 32-bit Processor Family G. Agosta Politecnico di Milano December 3, 2011 Contents 1 Introduction 1 1.1 Prerequisites............................. 2
Chapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER Pierre A. von Kaenel Mathematics and Computer Science Department Skidmore College Saratoga Springs, NY 12866 (518) 580-5292 [email protected] ABSTRACT This paper
Exceptions in MIPS. know the exception mechanism in MIPS be able to write a simple exception handler for a MIPS machine
7 Objectives After completing this lab you will: know the exception mechanism in MIPS be able to write a simple exception handler for a MIPS machine Introduction Branches and jumps provide ways to change
The Hexadecimal Number System and Memory Addressing
APPENDIX C The Hexadecimal Number System and Memory Addressing U nderstanding the number system and the coding system that computers use to store data and communicate with each other is fundamental to
9 Control Statements. 9.1 Introduction. 9.2 Objectives. 9.3 Statements
9 Control Statements 9.1 Introduction The normal flow of execution in a high level language is sequential, i.e., each statement is executed in the order of its appearance in the program. However, depending
Chapter 7 Assembly Language
Chapter 7 Assembly Language Human-Readable Machine Language Computers like ones and zeros 0001110010000110 Humans like symbols ADD R6,R2,R6 increment index reg. Assembler is a program that turns symbols
So far we have considered only numeric processing, i.e. processing of numeric data represented
Chapter 4 Processing Character Data So far we have considered only numeric processing, i.e. processing of numeric data represented as integer and oating point types. Humans also use computers to manipulate
Appendix C: Keyboard Scan Codes
Thi d t t d ith F M k 4 0 2 Appendix C: Keyboard Scan Codes Table 90: PC Keyboard Scan Codes (in hex) Key Down Up Key Down Up Key Down Up Key Down Up Esc 1 81 [ { 1A 9A, < 33 B3 center 4C CC 1! 2 82 ]
Mail 2 ZOS FTPSweeper
Mail 2 ZOS FTPSweeper z/os or OS/390 Release 1.0 February 12, 2006 Copyright and Ownership: Mail2ZOS and FTPSweeper are proprietary products to be used only according to the terms and conditions of sale,
Arduino Lesson 5. The Serial Monitor
Arduino Lesson 5. The Serial Monitor Created by Simon Monk Last updated on 2013-06-22 08:00:27 PM EDT Guide Contents Guide Contents Overview The Serial Monitor Arduino Code Other Things to Do 2 3 4 7 10
PART B QUESTIONS AND ANSWERS UNIT I
PART B QUESTIONS AND ANSWERS UNIT I 1. Explain the architecture of 8085 microprocessor? Logic pin out of 8085 microprocessor Address bus: unidirectional bus, used as high order bus Data bus: bi-directional
MarshallSoft AES. (Advanced Encryption Standard) Reference Manual
MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 3.0 May 6, 2015 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2015 All
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters
The char Type ASCII Encoding The C char type stores small integers. It is usually 8 bits. char variables guaranteed to be able to hold integers 0.. +127. char variables mostly used to store characters
Complete 8086 instruction set
Page 1 of 53 Complete 8086 instruction set Quick reference: AAA AAD AAM AAS ADC ADD AND CALL CBW CLC CLD CLI CMC CMP CMPSB CMPSW CWD DAA DAS DEC DIV HLT IDIV IMUL IN INC INT INTO I JA JAE JB JBE JC JCXZ
2011, The McGraw-Hill Companies, Inc. Chapter 3
Chapter 3 3.1 Decimal System The radix or base of a number system determines the total number of different symbols or digits used by that system. The decimal system has a base of 10 with the digits 0 through
Reading Delimited Text Files into SAS 9 TS-673
Reading Delimited Text Files into SAS 9 TS-673 Reading Delimited Text Files into SAS 9 i Reading Delimited Text Files into SAS 9 Table of Contents Introduction... 1 Options Available for Reading Delimited
King Fahd University of Petroleum and Minerals. College of Computer Science and Engineering. Computer Engineering Department COE 205
King Fahd University of Petroleum and Minerals College of Computer Science and Engineering Computer Engineering Department COE 205 Computer Organization and Assembly Language Lab Manual Prepared By: Mr.
Configuring Serial Terminal Emulation Programs
Configuring Serial Terminal Emulation Programs Table of Contents Configuring Serial Terminal Emulation Programs: An Introduction... 3 HyperTerminal... 3 Configuring HyperTerminal... 3 Tera Term Pro...
CS412/CS413. Introduction to Compilers Tim Teitelbaum. Lecture 20: Stack Frames 7 March 08
CS412/CS413 Introduction to Compilers Tim Teitelbaum Lecture 20: Stack Frames 7 March 08 CS 412/413 Spring 2008 Introduction to Compilers 1 Where We Are Source code if (b == 0) a = b; Low-level IR code
Lab Experience 17. Programming Language Translation
Lab Experience 17 Programming Language Translation Objectives Gain insight into the translation process for converting one virtual machine to another See the process by which an assembler translates assembly
Technical Paper. Reading Delimited Text Files into SAS 9
Technical Paper Reading Delimited Text Files into SAS 9 Release Information Content Version: 1.1July 2015 (This paper replaces TS-673 released in 2009.) Trademarks and Patents SAS Institute Inc., SAS Campus
MS-DOS, PC-BIOS, and File I/O Chapter 13
Thi d t t d ith F M k 4 0 2 MS-DOS, PC-BIOS, and File I/O Chapter 13 A typical PC system consists of many component besides the 80x86 CPU and memory. MS-DOS and the PC s BIOS provide a software connection
32-Bit Workload Automation 5 for Windows on 64-Bit Windows Systems
32-Bit Workload Automation 5 for Windows on 64-Bit Windows Systems Overview 64-bit Windows Systems Modifying the Working Folder for Universal Server Components Applications Installed in the Windows System
Number Representation
Number Representation CS10001: Programming & Data Structures Pallab Dasgupta Professor, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Topics to be Discussed How are numeric data
Chapter 11: Input/Output Organisation. Lesson 06: Programmed IO
Chapter 11: Input/Output Organisation Lesson 06: Programmed IO Objective Understand the programmed IO mode of data transfer Learn that the program waits for the ready status by repeatedly testing the status
The Answer to the 14 Most Frequently Asked Modbus Questions
Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in
ASSEMBLY LANGUAGE PROGRAMMING (6800) (R. Horvath, Introduction to Microprocessors, Chapter 6)
ASSEMBLY LANGUAGE PROGRAMMING (6800) (R. Horvath, Introduction to Microprocessors, Chapter 6) 1 COMPUTER LANGUAGES In order for a computer to be able to execute a program, the program must first be present
A Tiny Guide to Programming in 32-bit x86 Assembly Language
CS308, Spring 1999 A Tiny Guide to Programming in 32-bit x86 Assembly Language by Adam Ferrari, [email protected] (with changes by Alan Batson, [email protected] and Mike Lack, [email protected])
Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0
Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0 Copyright, 1999-2007 Virtual Integrated Design, All rights reserved. 1 Contents: 1. The Main Window. 2. The Port Setup Window. 3.
Lab 6 Introduction to Serial and Wireless Communication
University of Pennsylvania Department of Electrical and Systems Engineering ESE 111 Intro to Elec/Comp/Sys Engineering Lab 6 Introduction to Serial and Wireless Communication Introduction: Up to this point,
NØGSG DMR Contact Manager
NØGSG DMR Contact Manager Radio Configuration Management Software for Connect Systems CS700 and CS701 DMR Transceivers End-User Documentation Version 1.24 2015-2016 Tom A. Wheeler [email protected] Terms
SUDT AccessPort TM Advanced Terminal / Monitor / Debugger Version 1.37 User Manual
SUDT AccessPort TM Advanced Terminal / Monitor / Debugger Version 1.37 User Manual Version 1.0 - January 20, 2015 CHANGE HISTORY Version Date Description of Changes 1.0 January 20, 2015 Initial Publication
X86-64 Architecture Guide
X86-64 Architecture Guide For the code-generation project, we shall expose you to a simplified version of the x86-64 platform. Example Consider the following Decaf program: class Program { int foo(int
HP-UX Essentials and Shell Programming Course Summary
Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,
CENTRONICS interface and Parallel Printer Port LPT
Course on BASCOM 8051 - (37) Theoretic/Practical course on BASCOM 8051 Programming. Author: DAMINO Salvatore. CENTRONICS interface and Parallel Printer Port LPT The Parallel Port, well known as LPT from
System Calls and Standard I/O
System Calls and Standard I/O Professor Jennifer Rexford http://www.cs.princeton.edu/~jrex 1 Goals of Today s Class System calls o How a user process contacts the Operating System o For advanced services
TCP/IP Networking, Part 2: Web-Based Control
TCP/IP Networking, Part 2: Web-Based Control Microchip TCP/IP Stack HTTP2 Module 2007 Microchip Technology Incorporated. All Rights Reserved. Building Embedded Web Applications Slide 1 Welcome to the next
RS-485 Protocol Manual
RS-485 Protocol Manual Revision: 1.0 January 11, 2000 RS-485 Protocol Guidelines and Description Page i Table of Contents 1.0 COMMUNICATIONS BUS OVERVIEW... 1 2.0 DESIGN GUIDELINES... 1 2.1 Hardware Design
Compiler Construction
Compiler Construction Lecture 1 - An Overview 2003 Robert M. Siegfried All rights reserved A few basic definitions Translate - v, a.to turn into one s own language or another. b. to transform or turn from
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
Application Unit, MDRC AB/S 1.1, GH Q631 0030 R0111
, GH Q631 0030 R0111 SK 0010 B 98 The application unit is a DIN rail mounted device for insertion in the distribution board. The connection to the EIB is established via a bus connecting terminal at the
WinHLLAPI Language Reference
Worldwide Technical Support WinHLLAPI Language Reference 2004 Attachmate Corporation. All Rights Reserved. If this document is distributed with software that includes an end user agreement, this document,
Tamper protection with Bankgirot HMAC Technical Specification
Mars 2014 Tamper protection with Bankgirot HMAC Technical Specification Bankgirocentralen BGC AB 2013. All rights reserved. www.bankgirot.se Innehåll 1 General...3 2 Tamper protection with HMAC-SHA256-128...3
BCD (ASCII) Arithmetic. Where and Why is BCD used? Packed BCD, ASCII, Unpacked BCD. BCD Adjustment Instructions AAA. Example
BCD (ASCII) Arithmetic We will first look at unpacked BCD which means strings that look like '4567'. Bytes then look like 34h 35h 36h 37h OR: 04h 05h 06h 07h x86 processors also have instructions for packed
Lecture 22: C Programming 4 Embedded Systems
Lecture 22: C Programming 4 Embedded Systems Today s Goals Basic C programming process Variables and constants in C Pointers to access addresses Using a High Level Language High-level languages More human
Allen-Bradley. Bar Code. 2-D Hand-Held. Programming Guide. Bar Code. Scanners. (Cat. No. 2755-HTG-4)
Allen-Bradley 2-D Hand-Held Bar Code Scanners Bar Code Programming Guide (Cat. No. 2755-HTG-4) Important User Information The illustrations, charts, sample programs and layout examples shown in this guide
Continuous Integration Part 2
1 Continuous Integration Part 2 This blog post is a follow up to my blog post Continuous Integration (CI), in which I described how to execute test cases in Code Tester (CT) in a CI environment. What I
Streaming Lossless Data Compression Algorithm (SLDC)
Standard ECMA-321 June 2001 Standardizing Information and Communication Systems Streaming Lossless Data Compression Algorithm (SLDC) Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http://www.ecma.ch
As previously noted, a byte can contain a numeric value in the range 0-255. Computers don't understand Latin, Cyrillic, Hindi, Arabic character sets!
Encoding of alphanumeric and special characters As previously noted, a byte can contain a numeric value in the range 0-255. Computers don't understand Latin, Cyrillic, Hindi, Arabic character sets! Alphanumeric
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
Yubico YubiHSM Monitor
Yubico YubiHSM Monitor Test utility for the YubiHSM Document Version: 1.1 May 24, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
User Manuals. Connection to Siemens S5 PU (AS511) Part Number: 80860.699. Version: 2. Date: 18.10.2006
User Manual Connection to Siemens S5 PU (AS511) Part Number: 80860.699 Version: 2 Date: 18.10.2006 Valid for: User Manuals Version Date Modifications 1 09.06.2006 First Edition 2 18.10.2006 Optimized data
Version 1.5 Satlantic Inc.
SatCon Data Conversion Program Users Guide Version 1.5 Version: 1.5 (B) - March 09, 2011 i/i TABLE OF CONTENTS 1.0 Introduction... 1 2.0 Installation... 1 3.0 Glossary of terms... 1 4.0 Getting Started...
Hexadecimal Object File Format Specification
Hexadecimal Object File Format Specification Revision A January 6, 1988 This specification is provided "as is" with no warranties whatsoever, including any warranty of merchantability, noninfringement,
Software Developer's Manual
Software Developer's Manual Raster Command Reference PT-H500/P700/E500 Version 1.10 The Brother logo is a registered trademark of Brother Industries, Ltd. Brother is a registered trademark of Brother Industries,
Comp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8
Comp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8 January 22, 2013 Name: Grade /10 Introduction: In this lab you will write, test, and execute a number of simple PDP-8
Cleo Host Loginid Import Utility and Cleo Host Password Encryption Utility
Cleo Host Loginid Import Utility and Cleo Host Password Encryption Utility User Guide Page 1 of 28 INTRODUCTION...3 Overview... 3 Intended Audience... 3 LOGIN ID IMPORT UTILITY...4 HOST ENCRYPTED PASSWORD
Notes on Assembly Language
Notes on Assembly Language Brief introduction to assembly programming The main components of a computer that take part in the execution of a program written in assembly code are the following: A set of
64-Bit NASM Notes. Invoking 64-Bit NASM
64-Bit NASM Notes The transition from 32- to 64-bit architectures is no joke, as anyone who has wrestled with 32/64 bit incompatibilities will attest We note here some key differences between 32- and 64-bit
2 ASCII TABLE (DOS) 3 ASCII TABLE (Window)
1 ASCII TABLE 2 ASCII TABLE (DOS) 3 ASCII TABLE (Window) 4 Keyboard Codes The Diagram below shows the codes that are returned when a key is pressed. For example, pressing a would return 0x61. If it is
ND48-RS ASCII A2.04 Communication Protocol
ND48-RS ASCII A2.04 Communication Protocol SEM 06.2003 Str. 1/6 ND48-RS ASCII A2.04 Communication Protocol ASCII A2.04 protocol provides serial communication with most of the measurement and control devices
Intel Hexadecimal Object File Format Specification Revision A, 1/6/88
Intel Hexadecimal Object File Format Specification Revision A, 1/6/88 DISCLAIMER Intel makes no representation or warranties with respect to the contents hereof and specifically disclaims any implied warranties
Variables, Constants, and Data Types
Variables, Constants, and Data Types Primitive Data Types Variables, Initialization, and Assignment Constants Characters Strings Reading for this class: L&L, 2.1-2.3, App C 1 Primitive Data There are eight
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
TAP Interface Specifications
TAP Interface Specifications This Document is for those who want to develop their own paging control software or add an interface for the WaveWare v9 Series Paging Encoder to their existing software applications.
HOST Embedded System. SLAVE EasyMDB interface. Reference Manual EasyMDB RS232-TTL. 1 Introduction
Reference Manual EasyMDB RS232-TTL 1 Introduction This document explains how to use the interface EasyMDB RS232-TTL and describe the connections and the necessary commands for communicating with Cash System
EE 261 Introduction to Logic Circuits. Module #2 Number Systems
EE 261 Introduction to Logic Circuits Module #2 Number Systems Topics A. Number System Formation B. Base Conversions C. Binary Arithmetic D. Signed Numbers E. Signed Arithmetic F. Binary Codes Textbook
Translating to Java. Translation. Input. Many Level Translations. read, get, input, ask, request. Requirements Design Algorithm Java Machine Language
Translation Translating to Java Introduction to Computer Programming The job of a programmer is to translate a problem description into a computer language. You need to be able to convert a problem description
Sources: On the Web: Slides will be available on:
C programming Introduction The basics of algorithms Structure of a C code, compilation step Constant, variable type, variable scope Expression and operators: assignment, arithmetic operators, comparison,
COMPUTERS ORGANIZATION 2ND YEAR COMPUTE SCIENCE MANAGEMENT ENGINEERING JOSÉ GARCÍA RODRÍGUEZ JOSÉ ANTONIO SERRA PÉREZ
COMPUTERS ORGANIZATION 2ND YEAR COMPUTE SCIENCE MANAGEMENT ENGINEERING UNIT 1 - INTRODUCTION JOSÉ GARCÍA RODRÍGUEZ JOSÉ ANTONIO SERRA PÉREZ Unit 1.MaNoTaS 1 Definitions (I) Description A computer is: A
Laser Barcode Scanner User s Manual
Laser Barcode Scanner User s Manual FCC Compliance This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are
Managed File Transfer with Universal File Mover
Managed File Transfer with Universal File Mover Roger Lacroix [email protected] http://www.capitalware.com Universal File Mover Overview Universal File Mover (UFM) allows the user to combine
Illustration 1: Diagram of program function and data flow
The contract called for creation of a random access database of plumbing shops within the near perimeter of FIU Engineering school. The database features a rating number from 1-10 to offer a guideline
Lab 4: Socket Programming: netcat part
Lab 4: Socket Programming: netcat part Overview The goal of this lab is to familiarize yourself with application level programming with sockets, specifically stream or TCP sockets, by implementing a client/server
Interface and Simulation of a LCD Text Display
OVERVIEW The following application note describes the interface of a LCD text display to a 8051 microcontroller system. This application note comes with the µvision2 project LCD_Display.UV2 that includes
IBM Sterling Connect:Enterprise for z/os
IBM Sterling Connect:Enterprise for z/os Remote User s Guide Version 1.5 This edition applies to the 1.5 Version of IBM Sterling Connect:Enterprise for z/os and to all subsequent releases and modifications
Introduction. Application Security. Reasons For Reverse Engineering. This lecture. Java Byte Code
Introduction Application Security Tom Chothia Computer Security, Lecture 16 Compiled code is really just data which can be edit and inspected. By examining low level code protections can be removed and
Tutorial on C Language Programming
Tutorial on C Language Programming Teodor Rus [email protected] The University of Iowa, Department of Computer Science Introduction to System Software p.1/64 Tutorial on C programming C program structure:
The use of binary codes to represent characters
The use of binary codes to represent characters Teacher s Notes Lesson Plan x Length 60 mins Specification Link 2.1.4/hi Character Learning objective (a) Explain the use of binary codes to represent characters
LC-3 Assembly Language
LC-3 Assembly Language Programming and tips Textbook Chapter 7 CMPE12 Summer 2008 Assembly and Assembler Machine language - binary Assembly language - symbolic 0001110010000110 An assembler is a program
MONETA.Assistant API Reference
MONETA.Assistant API Reference Contents 2 Contents Abstract...3 Chapter 1: MONETA.Assistant Overview...4 Payment Processing Flow...4 Chapter 2: Quick Start... 6 Sandbox Overview... 6 Registering Demo Accounts...
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
plc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums
plc numbers - 3. Topics: Number bases; binary, octal, decimal, hexadecimal Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;
Introduction to MIPS Programming with Mars
Introduction to MIPS Programming with Mars This week s lab will parallel last week s lab. During the lab period, we want you to follow the instructions in this handout that lead you through the process
Basic Import Utility User Guide
2013 Basic Import Utility User Guide PERPETUAL INNOVATION Lenel OnGuard 2013 Basic Import Utility User Guide, product version 6.6 This guide is item number DOC-101, revision 3.003, July 2012 Copyright
Merchant Card Payment Engine
Merchant Card Payment Engine GATEWAY FREEDOM +IMA 3D SECURE INTEGRATION SUPPLEMENT Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced
INPUT AND OUTPUT STREAMS
INPUT AND OUTPUT The Java Platform supports different kinds of information sources and information sinks. A program may get data from an information source which may be a file on disk, a network connection,
The programming language C. sws1 1
The programming language C sws1 1 The programming language C invented by Dennis Ritchie in early 1970s who used it to write the first Hello World program C was used to write UNIX Standardised as K&C (Kernighan
Windows PowerShell Essentials
Windows PowerShell Essentials Windows PowerShell Essentials Edition 1.0. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights
DBF Chapter. Note to UNIX and OS/390 Users. Import/Export Facility CHAPTER 7
97 CHAPTER 7 DBF Chapter Note to UNIX and OS/390 Users 97 Import/Export Facility 97 Understanding DBF Essentials 98 DBF Files 98 DBF File Naming Conventions 99 DBF File Data Types 99 ACCESS Procedure Data
