- Microprocessor Systems
- - Introduction to Microprocessors
- - Components of a microprocessor-based system
- - Evolution of microprocessors
- - Types of Microprocessors
- - Intel's 8085 and Its architecture
- - 8085 Programming Model
- - Address Bus and Data Bus
- - Types of Instructions in 8085
- - Addressing Modes In 8085
- - 8086 Internal Architecture
- - The Bus Interface Unit
- - The Execution Unit
- - Importance of Segmentation
- - Data Addressing Modes of 8086
- - Assembler Directives
- - Constructing the Machine Codes for 8086 Instructions
- - Assembly Language Program Development Tools
- - Jumps, Flags, and Conditional Jumps
- - The 8086 String Instruction
Assembly Language Code
- Addition of two 8 bit numbers (Immediate Addressing Mode)
- Addition of two 8-bit numbers (Direct Addressing Mode)
- Multiplication of two 8-bit numbers (Direct Addressing Mode)
- Addition of two 16-bit numbers with carry (Direct Addressing Mode)
- Subtraction of two 8-bit numbers (Direct Addressing Mode)
- 2's Complement (Direct Addressing Mode)
- 1's Complement
- Largest of two 8-bit numbers
- Smallest of two 8-bit numbers
2. Theory of Computation
3. Cryptography & Network Security
Link to my publications:
- An optimized steganographic technique
http://link.springer.com/article/10.1007/s40012-016-0116-x
(Cite this article: Dwivedi, S. CSIT (2016). doi:10.1007/s40012-016-0116-x)
- On the applicability of Diploid Genetic Algorithms in Vertex Cover Problem
http://link.springer.com/article/10.1007/s40012-016-0113-0
(Cite this article: Amini, M., Dwivedi, S. & Beg, M.A. CSIT (2016). doi:10.1007/s40012-016-0113-0)
http://link.springer.com/article/10.1007/s40012-016-0116-x
(Cite this article: Dwivedi, S. CSIT (2016). doi:10.1007/s40012-016-0116-x)
- On the applicability of Diploid Genetic Algorithms in Vertex Cover Problem
http://link.springer.com/article/10.1007/s40012-016-0113-0
(Cite this article: Amini, M., Dwivedi, S. & Beg, M.A. CSIT (2016). doi:10.1007/s40012-016-0113-0)
- A Steganography Technique Based on the Huffman Codes and PM1 Technique
http://www.ijarcs.in/index.php/Ijarcs/article/view/3542
(Cite this article: Dwivedi, S., & Nafis, M. T. (2017). A Steganography Technique Based on the Huffman Codes and PM1 Technique. International Journal, 8(5).)
Security software can be configured to update multiple times a day if the need be; hardware updates usually consist of firmware upgrades and an update wizard much like that present within the software application.
ReplyDeletenetwork security
Paying network administrators to defend the integrity of your network is an expensive proposition - much more so than installing the proper security solution that your network requires.
ReplyDeleteutm network security
Wonderful article, Thank you for sharing amazing blog write-ups.
ReplyDeleteYou can also check out another blog on Cryptography and Network Security
Thank You! for sharing the article and helping us with ease of searching the notes. We are ezyschooling and we appreciate the post you have created. Keep up the good work.
ReplyDelete