Professional Documents
Culture Documents
MIC Project
MIC Project
SUBMITTED BY –
Sr.
No. Name of Student Roll No.
YEAR: 2023-24
Certificate
This is to certify that the Micro project work entitled
Dr. V. V.Giri
Principal
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Project Title-
Micro
Exam
Sr. Roll Enrollment Project Total
Name of Student No. Seat
No. No. Marks
No.
G I 6+4 = 10
1 32 2216440382
Rushikesh Kiran
Potdar
2 40 2216440390
Apoorva Pentappa
Irabatti
3 42 2216440392
Manasi Anil Gavali
Ms.T.S.Pujari
Course Outcomes (CO), Practical Outcomes (PRO’s) and Unit Outcomes (UOs) Mapping
PRO’s and
Mapping
INDEX
Sr. Page
CONTENT
No. No.
Abstract 1
1 Introduction 2
2 Algorithm 3
3 Flowchart 4
4 Code of program 5
5 Output 6
6 Instructions used 7
7 Conclusion 8
8 Reference 9
ALP to count negative numbers from array
ABSTRACT
In computing, signed number representations are required to encode negative numbers in binary
number systems.The early days of digital computing were marked by a lot of competing ideas
about both hardware technology and mathematics technology (numbering systems). One of the
great debates was the format of negative numbers, with some of the era's most expert people
having very strong and different opinions. One camp supported two's complement, the system
that is dominant today. Another camp supported ones' complement, where any positive value is
made into its negative equivalent by inverting all of the bits in a word. A third group supported
"sign & magnitude" (sign-magnitude), where a value is changed from positive to negative
simply by toggling the word's sign (high-order) bit.
INTRODUCTION
In mathematics, negative numbers in any base are represented by prefixing them with a − sign.
However, in computer hardware, numbers are represented in bit vectors only, without extra
symbols. The four best-known methods of extending the binary numeral system to represent
signed numbers are: sign-and-magnitude, ones' complement, two's complement, and excess-K.
Some of the alternative methods use implicit instead of explicit signs, such as negative binary,
using the base −2. Corresponding methods can be devised for other bases, whether positive,
negative, fractional, or other elaborations on such themes. There is no definitive criterion by
which any of the representations is universally superior. The representation used in most current
computing devices is two's complement.
ALGORITHM:
FLOWCHART:
Start
N Is
CF = 0
?
Is N
Word counter = 0
?
Y
SANJAY GHODAWAT INSTITUTE, ATIGRE 4
ALP to count negative numbers from array
Stop
CODE
OUTPUT
Instrutctions Used
mov:
This instruction is use to transfer the data from source(register of memory location ) to destination(register of
memory location ).
jnc:
Here the processor jumps to a specified label.if there is no carry.
Inc:
Inc instruction the content of destination get incremented by 1 and result is stored at destination.
add:
In this instruction the data of source and destination get added the result is stored at destination.
rol:
This instruction rotates all the bits of destination count times towards left.The bit move out from MSB both into
carry flag as well as shifted out LSB. In case of multiple rotates carry flag will containmot reciently shifted
from MSB.
CONCLUSION
REFERENCE
www.eeeguide.com/rotate-instruction-in-8086/
www.tutorialspoint.com/microprocessor/microprocessor_8086_overview.html
www.google.com
9
SANJAY GHODAWAT INSTITUTE ,ATIGRE