BUILDING SIMPLE ALU

Prompt

In this project, you will design and build a simple CPU on Logisim and write programs that can run on it. If you haven’t yet, you can download Logisim by following this link: http://www.cburch.com/logisim/download.html

Your design will go through four phases. In the first phase, you will design and build the ALU using Logisim. In the second phase, you will design the instruction set that implements the instructions you designed in phase one. In the third phase, you will design and implement a control unit for this ALU using Logisim. By connecting the CU to the ALU, you will get a functional CPU. In phase four of the project, you will write assembly language programs for the CPU you built.

Phase One

Start by building an 8-bit ALU using Logisim. This ALU can implement 16 instructions on 8-bit operands. We would suggest the following minimum list of instructions:

· Arithmetic addition

· Increment

· Decrement

· Comparison (with 3 outputs: one for equals, one for less than and one for greater than)

· Logic bitwise Not

· Logic bitwise And

· Logic bitwise Or

· Register right logic shift

· Register left logic shift

In addition to these nine instructions, please suggest five more instructions that the ALU can implement for a total of 14 instructions (we are reserving 2 instructions for branching). Justify the importance of the five instructions you added in a Word doc to submitted as part of this assignment. Label these instructions as ‘Phase One.’

After you’ve suggested and justified your five suggested instructions, please build at least the nine above-mentioned operations as blocks in Logisim.

Phase Two

In phase two of the project, you are required to design the instruction set of the ALU/CPU as follows:

· Create the opcode table for the ALU by giving a binary code and a name for each instruction you built in Logisim in phase one.

· Decide how many operands you want your instructions to handle and justify your choice. We suggest either one operand with accumulator or two operands with the result stored in one of the input registers.

· In Logisim, add a multiplexer to the circuit you built in phase one that chooses one of the available operations. The simplest way to create this part of the CPU is to connect the outputs of the multiplexer to the inputs of AND arrays connected to the output of the operation blocks.

Please record your answer to phase two in the same Word doc and label it ‘Phase Two.’

Phase Three

In phase three, you are required to use Logisim to implement the control unit for at least the following three operations:

· addition

· logic bitwise AND

· right logic shift

In order to finish this phase, you need to add operand registers according to the decision you took for the number of operands in phase two and, if needed, a flag register.

Please record your answer to phase three in the same Word doc and label it ‘Phase Three.’

Phase Four

In order to be able to write assembly language for the CPU we need to add to instructions (without implementation):

· branch to an address (name it JMP)

· conditional branch to an address (name it CJMP and suppose that the jump takes place if the comparison operation result is ‘equals’)

Now, write the following programs using the assembly language you designed in the previous phases of the project as well as these two branching additional instructions:

· Write a program that adds two operands.

· Write a program that adds operands until the new value to be added is 0. You do not need to implement the input operations to modify the contents of the registers. Just assume that by the end of each iteration, the register content is modified.

· Write a program that increments by 2 the content of a register 10 times.

· Write a program that shifts the content of a register until the least significant bit is 0. Think of a way to stop shifting if the content of the register is 11111111 and add it to your program.

· Please record your programs in the same Word doc and label them under the section ‘Phase Four.’

security architecture 4

 

Faced with the need to deliver risk ratings for your organization, you will have to substitute the organization’s risk preferences for your own. For, indeed, it is the organization’s risk tolerance that the assessment is trying to achieve, not each assessor’s personal risk preferences.

 What is the risk posture for each particular system as it contributes to the overall risk posture of the organization?

How does each attack surface – its protections if any, in the presence (or absence) of active threat agents and their capabilities, methods, and goals through each situation—add up to a system’s particular risk posture?

In addition, how do all the systems’ risks sum up to an organization’s computer security risk posture?

Week 2 Assignment Negligent Tort

 

Visit the United States Consumer Product Safety Commission website. Click on “Recalls.” Choose one product that has been recalled.

 

  1. Describe the product subject to recall, including the recall date, recall number, and the reason for the recall.
  2. Analyze whether the manufacturer would be liable for negligence if the product had not been recalled and had caused harm to a consumer.
  3. Discusses the following in relation to the product recall:
  4. Duty of Care
  5. Standard of Care
  6. Breach of the Duty of Care
  7. Actual Causation
  8. Proximate Causation
  9. Actual Injury
  10. Defenses to Negligence
  11. Analyze and apply a relevant consumer protection statute identified under “Consumer Protection” in Chapter 8 of your text in conjunction with the product recall that you have identified. Must address the topic with critical thought.

 

Submit a four- to five-page paper (not including title and reference pages). Your paper must be formatted according to APA style as outlined in the approved APA style guide and must cite at least three scholarly sources in addition to the textbook

 

Seaquist, G. (2012). Business law for managers. San Diego, CA: Bridgepoint Education,

 

literature review

details in the document

Psychological law assignment

Selective Service

The selection process for law enforcement officers includes an interview, situational tests, and psychological tests. As in most professions, officers also participate in annual continuing education programs.  While there is a need for updated training for officers, researchers have also recognized the need to study police behaviors. Recently, researchers have created a mobile electroencephalogram (EEG) to monitor brain activity of officers when put into stressful situations. Read about the study here. Now locate a news article that discusses how police officers are trained to handle stressful situations. Given the information you found, how does your article interpret the research study? Your paper should be no more than two (2) pages and should include an APA citation for the article analyzed.

Can someone help me with the term paper

 The topic i have selected:

Abstract:

I will be going with the subject “Fraud detection using Data Mining” Fraud affirmation is an approach to manage shield others from being attacked by designers or to get secure from the cash desperado and cheats with the assistance of progression. Information Mining (DM) blueprint systems in recognizing firms that issue fraudulent financial statements (FFS) and manages the obvious affirmation of parts related to FFS. This evaluation explores the settlement of Decision Trees, Neural Networks, and Bayesian Belief Networks in the prominent proof of sham spending summaries. The information vector is made out of degrees got from budgetary outlines.

Introduction:

Data uncovering is looking for secured, significant, and possibly supportive models in huge enlightening lists. Data Mining is connected to finding unsuspected/already dark associations among the data. 

It is a multi-disciplinary fitness that usages AI, estimations, AI, and database advancement.

Types of data mining

Relational database 

Data warehouse

Text mining data mining

Distributed database

Operational database

End-user database

Kirkos, E., Spathis, C., & Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements. Expert systems with applications, 32(4), 995-1003

BCJ Unit #2

Please answer ONE of the following:

• Begin each writing assignment by identifying the question number you are answering followed by the actual question itself (in bold type). • Use a standard essay format for responses to all questions (i.e., an introduction, middle paragraphs and conclusion). APA Format, 2 pages , 500 words, all citing and references.

1.Identify and explain the four restrictions to a search incident to an arrest. 
 
 
2.Define and explain the requirements in Terry stops and Terry frisks. How do they differ from a 
 search?
 
3.Explain the concept of administrative justification and how it applies to vehicle and person 
 inventories. Include relevant Supreme Court decisions in your answer.

Cyber law assignment

Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.”  

Please write an essay of not less than 500 words, summarizing the court’s decision

Crime Scene Investigation

Part 1

Reply to each topic with 200 word minimum

 

Topic 1: Examination in Rape Cases

How would you handle a Sexual Assault Case, from start to finish?  Describe the steps. What do you think there should be in a Sexual Assault kit? What should be included in a medical examination in a rape case? How is this procedure different than any other case?

 

Topic 2: Burglary Scenes

You’re called to a Burglary scene and the house is a MESS.  All the drawers in the bedrooms are pulled out, the televisions and the computers are gone. As a Crime Scene Technician and the lead investigator, where do you begin? Describe the interview and processing from start to finish.

 

Topic 3: Ethnography Field Research

Read the following Ethnographic study.

Winlow, S., Hobbs, D., Lister, S., & Hadfield, P. (2001). Get Ready to Duck: Bouncers and the Realities of Ethnographic Research on Violent Groups. British Journal of Criminology, 41 (3), 536-548. Retrieved from http://bjc.oxfordjournals.org/content/41/3/536.full.pdf+html

Focus on the role of observation and the dangers involved as well as the ethical considerations of conducting such research.

Identify the method of observation used in this study and why it was used. Comment on whether it was effective. Explain your reasons.

 

What are some of the challenges faced by the researchers in this study? How did they address them? Were they successful? Explain your answer.

 

Part 2

Set up a mock crime scene in your house or business and process it for evidence as you would at a real burglary scene. Take pictures of the evidence and collect it by using the method of your choice. Note: for this learning activity, you will not have package the evidence.

Submit at least four or five photos in a PowerPoint presentation with an explanation of the crime scene.

 

NOTE: if you do not have access to a digital camera, you may use a camera phone.

aviation hw help

 I have a research assignment that is due September 20th at 11:00pm. The assignment has 4 questions and it needs to be from one to two paragraphs each. I have attached the questions.  

  

Review Questions Module 3: just answer the questions in 1-3 sentences. 

there is about 12 questions 

due September 20th at 11:00 pm