Easy and Human Readable Machine Code – Motor Automation Assembly

;** ********************************************************
;** TITLE : Warrior 2011
;** DATE : 14 FEBRUARY 2011
;**
;** P1.0 : PUMP-1 STATUS
;** P1.1 : FULL TANK-1
;** P1.2 : NORMAL TANK-1
;** P1.3 : RESERVE TANK-1
;**
;** P1.4 : PUMP-2 STATUS
;** P1.5 : FULL TANK-2
;** P1.6 : NORMAL TANK-3
;** P1.7 : RESERVE TANK-3
;**
;** ACC (A) IS KEY POINT TO MAKE DECISION
;** ************************************************************
;** DEVICE : ATMEL MICROCONTROLER 8051 (AT89C51) OR (AT89S51)
;** AURTHOR : SAHARA FOUNDATION – RAJENDRA MAN BANEPALI
;** ************************************************************
;**
;** DESCRIPTION: THE DEVICE IS USED TO AUTOMATE TWO WATER PUMPS
;** ************************************************************
Continue reading “Easy and Human Readable Machine Code – Motor Automation Assembly”

Advertisements

Addition in Assembly

;** Add PROGRAMME ON ASSEMBLY
;** DATE: 11 FEBRUARY 2011
;** OBJECTIVE: USE OF REGISTER AND ACCUMULATOR WITH ADD
;** AURTHOR: SAHARA FOUNDATION – RAJENDRA MAN BANEPALI

ORG 0000H

MOV R5, #25
MOV R7, #34H
MOV A, #0
ADD A, R5 ;** ASSIGNING ACCUMULATOR BY VALUE OF R5 = A = A + 25
ADD A, R7 ;** ADDING VALUE OF A + R7 AND ASSIGN TO ACCUMULATOR *A
ADD A, #12H

HERE: SJMP HERE

END

ISP Flash Microcontroller Programmer

Introduction
This ISP Programmer can be used either for in-system programming or as a stand-alone spi programmer for Atmel ISP programmable devices. The programming interface is compatible to STK200 ISP programmer hardware so the users of STK200 can also use the software which can program both the 8051 and AVR series devices.

Download:
Document: ISP Flash Microcontroller Programmer
Software: ISP-Flash Programmer Software ISP-30a.zip
or
Download alternate link
Note: Alter downloading the file, please change the extension of the file. into “zip” extension.

7 Segment Assembly Code

;** ********************************************************
;** SEVEN SEGMENT LED
;** DATE: 14 FEBRUARY 2011
;** R1 IS USED TO SET VALUE OF 1-DIGITAL DISPLAY VALUE OF SEVEN SEGMENT
;** P1 IS OUT PUT OF SEVEN SEGMENT
;** R7-R6-R5 IS USED FOR DELAY
;** ********************************************************
;** DEVICE : INTEL MICROCONTROLER 8051 (809C51)
;** AURTHOR : SAHARA FOUNDATION – RAJENDRA MAN BANEPALI
;** ********************************************************
; Continue reading “7 Segment Assembly Code”

Microcontroller

A microcontroller (sometimes abbreviated µC, uC or MCU) is a small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals. Program memory in the form of NOR flash or OTP ROM is also often included on chip, as well as a typically small amount of RAM. Microcontrollers are designed for embedded applications, in contrast to the microprocessors used in personal computers or other general purpose applications.

Microcontrollers are used in automatically controlled products and devices, such as automobile engine control systems, implantable medical devices, remote controls, office machines, appliances, power tools, and toys. By reducing the size and cost compared to a design that uses a separate microprocessor, memory, and input/output devices, microcontrollers make it economical to digitally control even more devices and processes. Mixed signal microcontrollers are common, integrating analog components needed to control non-digital electronic systems. Continue reading “Microcontroller”

Role Base Security Management – ASP.NET Security Model

In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is a newer alternative approach to mandatory access control (MAC) and discretionary access control (DAC). RBAC is sometimes referred to as role-based security.

Within an organization, roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned particular roles, and through those role assignments acquire the permissions to perform particular system functions. Since users are not assigned permissions directly, but only acquire them through their role (or roles), management of individual user rights becomes a matter of simply assigning appropriate roles to the user; this simplifies common operations, such as adding a user, or changing a user’s department.
Three primary rules are defined for RBAC:
1. Role assignment: A subject can execute a transaction only if the subject has selected or been assigned a role.
2. Role authorization: A subject’s active role must be authorized for the subject. With rule 1 above, this
3. Transaction authorization: A subject can execute a transaction only if the transaction is authorized for the subject’s active role. With rules 1 and 2, this rule ensures that users can execute only transactions for which they are authorized.

Role Base Security Management – Complete file

Research on Content Management System

CMS-ScreenRecently, I am doing research on Content Management Sysem (CMS) which is WEB base. I have almost finished documentation and design part and doing on the computer. The System is design in ASP.NET and PHP with Model Control View Conceptual framework. It is a management system in which other extensions are installed for new facility. You can download this system soon. We are releasing the system soon. The system is called “SAHARA iPod 100″.

Download SAHARA iPod 100
Try Demo in PHP >>
Try Demo in ASP.NET (It will be remain for a short days only) >>

::: Research Site

Ajax 4 PHP and ASP

Step 1 – Ajax basics
________________________________________
Ajax PHP tutorial
In this article I don’t want to show you the history of AJAX and discuss its pros and cons, but only focus on how to create a basic working AJAX – PHP communication. The only important thing at the moment is that AJAX uses JavaScript so it need to be enabled in your browser to successfully complete this tutorial.
Continue reading “Ajax 4 PHP and ASP”