######## ################## ###### ###### ##### ##### #### #### ## ##### #### #### #### #### #### ##### ##### ## ## #### ## ## ## ### ## #### ## ## ## ##### ######## ## ## ## ##### ## ## ## ## ## ##### ## ## ######## ## ## ## ### ## ## #### ## ## ##### #### #### #### #### ##### #### #### #### #### #### ###### ##### ## ###### ###### Issue #9 ################## Jan. 24, 1995 ######## ------------------------------------------------------------------------------ Editor's Notes by Craig Taylor And *drum beat please* here's another issue of Commodore Hacking!! We've lasted longer and had more issues put out than some other magazines I won't discuss (*wondering where issue 39 of that mag is*). Not many Commodore notes this time - things have gotten a little bit more montatenous(sp - it's late) on the Commodore front. I was unable to get an article by Craig Bruce in time but I got the next best thing: An interview with him!! Users of his software may find this interview interesting in how he looks at programming. Right now I'm entertaining the thought of dropping C= Hacking after I graduate which will be sometime around July 1st of this year. I'm interested in somebody who would "carry the reign" so to speak, and take over my job of nagging, bugging people etc :-) to write articles. I've got my system fairly automated in handling requests here - if that person has a VAX account then I could set them up with a mailserver, if a UNIX account then there's oodles of them floating on the net that could be used. _PLEASE_ write to me and lemme know if you're interested. I'm going to try to get one more issue of Commodore Hacking out before July 1st. =========================================================================== Please note that this issue and prior ones are available via anonymous FTP from ccosun.caltech.edu (amongunders) under /pub/cbm/hacking.mag and via a mailserver which documentation can be obtained by sending mail to "duck@pembvax1.pembroke.edu" with a subject line of "mailserver" and the lines of "help" and "catalog" in the body of the message. =========================================================================== Legal Mumbo-Jumbo Permission is granted to re-distribut3e this "net-magazine", in whole, freely for non-profit use. However, please contact individual authors for permission to publish or re-distribute articles seperately. A charge of no greater than 5 US dollars or equivlent may be charged for library service / diskettte costs for this "net-magazine". =========================================================================== In This Issue: Commodore Trivia Corner This edition of Commodore Trivia Corner contains the answers to the July edition of trivia ($070 - $07F), the questions and answers for August ($080 - $08F), September ($090 - $09F), October ($0A0 - $0AF), November ($0B0 - $0BF), and the questions for the December edition ($0C0 - $0CF). Enjoy them! A Different Perspective, part II This month George and Steve continue their series on 3D graphics on the C-64 with a look at hidden faces and filled faces. In addition to adding these features into last month's program some other improvements to the old program will be discussed, such as fast multiplication (around 24 cycles) and various bug fixes -- for instance, the program now works on older C-64's which initialize color RAM to the background color when the screen is cleared (sorry about that ;-). A very primitive form of texture mapping is also included. As usual, full source and executables are included. The native C64 files are in a Lynx archive, so you will obviously need Lynx to get at them -- check your favorite BBS or FTP site. 2D Graphics Toolbox: Circles To augment three-dimensional algorithms this series will focus on two-dimensional drawing algortihms. Circles are the subject this time around (heh -- get it?), and a very fast algorithm for drawing them on your C64 is presented, with examples in assembly and BASIC7.0. How fast is fast? How does 11 cycles per pixel without the use of tables grab ya? AFLI=specs v1.0 In AFLI we can get 120 colors in theory (counted like this 16!/(2!*14!)=120). When we put red and blue hires pixels close to each other we get a vision of purple - thanks the television. This article details what AFLI is, how it's used and done. Coding Tricks Included are a series of postings to comp.sys.cbm about neat coding tricks (in machine language) that are interesting and useful. C.S.Bruce Interview An interview with the author of Zed, the ACE os and many other numerous utilities for the Commodore 64/128. Aligning 1541 Drives A discussion regarding Commodore 1541 disk drive alignment procedures, with suggestions. =========================================================================== Commodore Trivia Corner by Jim Brain (brain@mail.msen.com) Well, it is a new year, and I am sending up a new collection of the Commodore rivia for all to enjoy. If you haven't seen this already, the following is a collection of trivia questions that I post to various networks every month. I have collected Trivia Edition #8-13 in this article. As you may know, these questions form part of a contest in which the monthly winner gets a prize (Thanks to my various prize donators). The whole thing is mainly just for fun, so please enjoy. As the new year rolls in, I am happy to report the following: 1) As I have gained access to FIDONet, the trivia is now posted to both the USENET newsgroup COMP.SYS.CBM on the Internet AND the FIDONet echo CBM every month. 2) A number of publications have started publishing the trivia, including Commodore World, and a variety of club newsletters. 3) I have moved into my new house (See new address at bottom). While this may not seem important, the extra room I now have means I can now bring all of my old CBM machine to the new house and work with them. Working with them gives me fodder for more trivia. As always, I welcome any questions (with answers), and encourage people to enter their responses to the trivia, now at #13. Be sure you get the responses to me by January 12th at noon. Jim. The following article contains the answers to the July edition of trivia ($070 - $07F), the questions and answers for August ($080 - $08F), September ($090 - $09F), October ($0A0 - $0AF), November ($0B0 - $0BF), and the questions for the December edition ($0C0 - $0CF). Enjoy them! Here are the answers to Commodore Trivia Edition #8 for July, 1994 Q $070) On a PET series computer, what visual power-on indication will tell the user whether the computer has Revision 2 or Revision 3 ROMs? A $070) Revision Level 2 ROMS (the ones with more bugs) power up with: *** COMMODORE BASIC ***, with '*' in place of the more familiar '#' character. Q $071) The IEEE-488 interface is sometimes called the GPIB interface. What does GPIB stand for? A $071) General Purpose Interface Bus. Another name is Hewlett Packard Interface Bus (HPIB), since HP developed this standard for its istrumentation device networking. Q $072) Commodore manufactured at least two hard drives with IEEE-488 interfaces. Can you name them? A $072) The Commodore D9060 and D9090. From the cbmmodel.txt file: * CBM D9060 5 MB Hard Drive, DOS3.0, Off-White, IEEE-488. GP * CBM D9090 7.5 MB Hard Drive, DOS3.0, Off-White, IEEE-488. GP The following model has been said to be in existence, though no one has one on hand to prove it: * CBM D9065 7.5 MB Hard Drive And this model may never have made it past the prototype stage: CBM D9062 Dual D9065. Q $073) Why didn't buyers like the original PET-64? A $073) It looked just like a old-style C-64. It had a "home" computer look that the schools didn't care for. They liked the "business" look of the PET series, so Commodore put refurbished and new 64 motherboards in PET cases and sold them as PET 64s. The repackaging suited the schools. Q $074) On a PET Revision 2 ROM, what was the largest single array size that BASIC could handle? A $074) An array can have a cumulative total of 256 elements. For single dimension arrays, that means D(0) to D(255), but a 2D array can only go from DD(0,0) to DD(1,127) etc. All types of arrays had this limitation. Q $075) On the stock 1541, data is transmitted one bit at a time. How many bits are transferred at a time on the Commodore 1551 disk drive? A $075) 3 bits were transmitted at a time. I assume that each byte had a parity bit tacked on for error detection, so it would have taken 3 transfers to transmit a byte of information from the drives. Q $076) On all Commodore floppy disk drives, how fast does the disk spin? A $076) 300 RPM. Q $077) Upon first reading the Commodore 1541 Error channel after turning on the disk drive, what error number and text is returned? A $077) 73, CBM DOS V2.6 1541, 0, 0 Q $078) What error number and text is returned on a 1551? A $078) 73, CBM DOS V2.6TDISK, 0, 0 Notice that the new text JUST fits! Q $079) Commodore printers are normally assigned to device #4, but they can be also used as device #? A $079) #5. The Commodore 1525 has a switch to do this, but not all printers have such a switch. Q $07A) What microprocessor is used in the Commodore 1551 disk drive? A $07A) the 6510T. It is a slight variant on the 6510 microprocessor used on the C64. Some say it runs at 2 MHz, but the specs drives spec sheet doesn't say. Q $07B) When the VIC-20 was designed, the serial port throughput was roughly equivalent to the throughput of the IEEE-488 bus? Why isn't it very fast in production VICs? A $07B) Let's go back to question $04F: Q $04F) What was the primary reason Commodore went to a serial bus with the introduction of the VIC-20? A $04F) Jim Butterfield supplied me with this one: As you know, the first Commodore computers used the IEEE bus to connect to peripherals such as disk and printer. I understand that these were available only from one source: Belden cables. A couple of years into Commodore's computer career, Belden went out of stock on such cables (military contract? who knows?). In any case, Commodore were in quite a fix: they made computers and disk drives, but couldn't hook 'em together! So Tramiel issued the order: "On our next computer, get off that bus. Make it a cable anyone can manufacture". And so, starting with the VIC-20 the serial bus was born. It was intended to be just as fast as the IEEE-488 it replaced. And here is what Jim Butterfield followed up with: "Technically, the idea was sound: the 6522 VIA chip has a "shift register" circuit that, if tickled with the right signals (data and clock) will cheerfully collect 8 bits of data without any help from the CPU. At that time, it would signal that it had a byte to be collected, and the processor would do so, using an automatic handshake built into the 6522 to trigger the next incoming byte. Things worked in a similar way outgoing from the computer, too. We early PET/CBM freaks knew, from playing music, that there was something wrong with the 6522's shift register: it interfered with other functions. The rule was: turn off the music before you start the tape! (The shift register was a popular sound generator). But the Commodore engineers, who only made the chip, didn't know this. Until they got into final checkout of the VIC-20. By this time, the VIC-20 board was in manufacture. A new chip could be designed in a few months (yes, the silicon guys had application notes about the problem, long since), but it was TOO LATE! A major software rewrite had to take place that changed the VIC-20 into a "bit-catcher" rather than a "character-catcher". It called for eight times as much work on the part of the CPU; and unlike the shift register plan, there was no timing/handshake slack time. The whole thing slowed down by a factor of approximately 5 to 6. When the 64 came out, the problem VIA 6522 chip had been replaced by the CIA 6526. This did not have the shift register problem which had caused trouble on the VIC-20, and at that time it would have been possible to restore plan 1, a fast serial bus. Note that this would have called for a redesign of the 1540 disk drive, which also used a VIA. As best I can estimate - and an article in the IEEE Spectrum magazine supports this - the matter was discussed within Commodore, and it was decided that VIC-20 compatibility was more important than disk speed. Perhaps the prospect of a 1541 redesign was an important part of the decision, since current inventories needed to be taken into account. But to keep the Commodore 64 as a "bit-banger", a new problem arose. The higher-resolution screen of the 64 (as compared to the VIC-20) could not be supported without stopping the CPU every once in a while. To be exact: Every 8 screen raster lines (each line of text), the CPU had to be put into a WAIT condition for 42 microseconds, so as to allow the next line of screen text and color nybbles to be swept into the chip.(More time would be needed if sprites were being used). But the bits were coming in on the serial bus faster than that: a bit would come in about every 20 microseconds! So the poor CPU, frozen for longer than that, would miss some serial bits completely! Commodore's solution was to slow down the serial bus even more. That's why the VIC-20 has a faster serial bus than the 64, even though the 64 was capable, technically, of running many times faster. Fast disk finally came into its own with the Commodore 128." --Jim Q $07C) On Commodore computers, how much RAM is set aside as a tape buffer? A $07C) 192 bytes is used as a tape buffer. Blocks of data on tape are 192 bytes long. Q $07D) On Commodore computers, most every peripheral has a device number. What is the device number of the screen? A $07D) #3 Q $07E) What is the device number of the keyboard? A $07E) #0 Q $07F) Commodore computers use 2's-complement notation to represent integers. What is the 2's-complement hex representation of the signle byte -1? A $07F) (This was not a Commodore specific question) Commodore computers use this notation to represent integer quantities. In 2's complement notation, a -1 looks like 11111111(binary) or $FF(hex). Here are the answers to Commodore Trivia Edition #9 for August, 1994 Q $080) During the days of the Commodore 64 and the VIC-20, Commodore produced at least two Commodore magazines. What were their names? A $080) The magazines were originally called "Commodore Microcomputers" and "Power/Play: Commodore Home Computing". They never did seem to nail down the name of the latter as I see "Power/Play" and "Commodore: Power/Play" used as the original names as well. Anyway, Commodore Microcomputers started its life in 1979, whereas "Power/Play" started in 1981. Both magazines were published until around 1987, when they were merged to form "Commodore Magazine". Then, around 1990, the magazine was sold to IDG Communications and was merged into RUN. RUN was continued for a while, but was finally pulled out of circulation. Creative Micro Designs purchased the rights to the magazine, and now Commodore World is being produced by CMD. I am not sure how strong (if any) a link there is between RUN and CW, but some of the same authors write for the new publication. Just for added info, here are the ISSN numbers: Commodore Microcomputers (Commodore Magazine) 0744-8724 Power/Play:Commodore Home Computing 0739-8018 RUN (Commodore/RUN) 0741-4285 "The Transactor" is also a correct answer, and info on it is below. Q $081) Back in the PET heyday, another magazine was produced by Commodore Canada. This magazine was later sold and showed up as a hardware journal. Name the magazine. A $081) The infamous "Tarnsactor". One of the noted C64 hardware-hacking magazines, it was originally published by Commodore Canada, before being sold to an individual named Mr. Hilden. Its ISSN number is 0838-0163. As far as I can tell, this magazine, died many deaths, but ceased to exist in 1989-90. Its first issue is dated April 30, 1978. Q $082) The Commodore 128 has a VIC-II compatible chip inside it. Can this chips be switched for a VIC-II from a Commodore 64? A $082) No! The newer 128 compatible chip (VIC-IIe) has 8 extra pins to perform timing functions specific for the 128. In addition, some of the registers have extra functions. However, a suitable card to make it compatible can be made. Q $083) What does the video encoding standard PAL expand to? A $083) Phase Alternating Line is the answer I was looking for, which describes the video encoding used in Europe, but Programmable Array Logic is also correct, which describes the family of chips used as "glue" logic for the C64 I/O and processing chips. Q $084) How many buttons were present on the earliest of Commodore tape decks? A $084) 5: Play, Rewind, Fast-Forward, Record, and Stop/Eject. Later models separated the stop and eject functions into two buttons. Q $085) Earlier SID chips had a distinctive "clicking" sound that some demo coders used to an advantage. Commodore subsequently removed the click, and then later reintroduced it. When does the telltale click occur? A $085) When you change the volume of a voice. The voice need not be outputting anything. Q $086) What does CP/M stand for? A $086) Take your pick: Control Program/Monitor Control Program for Microprocessors Control Program for Microcomputers. The last one is considered by many to be most correct. Q $087) What is the highest line number allowed for a program line in Commodore BASIC V2? A $087) Normally, the user cannot enter a line number higher than 63999. If you want to be tricky, however, the numbers can be made to go up to 65535. Q $088) What symbol, clearly printed on the front of a key on the Commodore VIC, 64, and 128 keyboard, is not available when the lower case character set is switched in? A $088) The PI symbol. It is [SHFT-UPARROW] in uppercase mode, but becomes a checkerboard-like character when in lower-case mode. Unlike the graphics characters printed on the fronts of the keys, this one is positioned in the middle of the keycap, and should probably be accessible in both character sets. Q $089) How do you get the "checkmark" character ? A $089) In lowercase mode, type a shift-@ Q $08A) On the PET computers, what memory location holds the Kernal ROM version? A $08A) It is different from the 64/128. It is 50003. 0 here indicates old ROMs, while 1 indicates new ROMs. Q $08B) The Commodore computers have 2 interrupts, called IRQ and NMI. What does IRQ stand for? A $08B) Interrupt ReQuest. This interrupt is used for things that should usually be allowed to interrupt the processor. This interrupt can be masked off by the SEI instruction. Q $08C) What does NMI stand for? A $08C) Non-Maskable Interrupt. Unlike the IRQ, this interrupt cannot be masked by an instruction. However, some tricks can be used to mask it. Q $08D) The 6502 line of microprocessors has a number of flags that can be used to test for certain conditions. One of then is the N flag. What does it stand for? A $08D) 'N' stands for Negative. On instructions that change this flag, it is set to be equal to bit 7 of the result of the instruction. Q $08E) How about the D flag? A $08E) It stands for decimal mode. This mode causes certain instructions to treat a byte as 2 4 bit BCD-coded nybbles. Q $08F) The shorthand for the BASIC keyword PRINT is '?'. What is the shorthand equivalent for PRINT#? A $08F) pR is the way to abbreviate PRINT#. Note that ?# will fail. Here are the answers to Commodore Trivia Edition #10 for September, 1994 Q $090) The 6502 has a rich history. It is modeled after another 8-bit microprocessor. Name the processor. A $090) The 65XX series of processors was modeled after the Motorola 6800. Motorola hampered the design groups' efforts to pursue product developments using the 6800. A core group of 8 designers left Motorola and went to MOS Technologies, which was the largest producer of calculator chips at the time. MOS decided it was time to go into the CPU business. Q $091) The 6502 has a older brother that was never produced. Name its number designation and why it was not produced. A $091) The older brother to the 6502 was the 6501. The 6501 was pin-compatible with the 6800, which prompted a suit by Motorola. Eventually, MOS reached an agreement where they scrapped the 6501 marketing, but were free to market the 6502. Q $092) How many different opcodes are considered valid and "legal" on the MOS NMOS 6502 line? A $092) 151 opcodes are documented in the NMOS 6502 data book. The remaining 105 opcodes were not implemented, and exist as "don't care" states in the opcode matrix. That means that some seemingly invalid opcodes will actually perform pieces of two or more valid opcodes. Newer CPU systems trap all non-implemented opcode usages, but not the 6502. Q $093) Every instruction takes at least __ cycles to complete. Fill in the missing number. A $093) 2. The architecture assumes that each opcode has two bytes in it and one byte can be fetched per cycle. For instructions that use only 1 byte, the extra fetched byte (actually the next opcode), is thrown away. Q $094) Which instructions take more time than necessary as a result of the answer to Q $093? A $094) Although this is a subjective answer, One could nominate NOP on the basis that NOP is generally believed to waste one execution cycle on a particular processor, namely one cycle on the 65XX line. However, one can argue that NOP simply means no operation, and has no ties to length of execution. You be the judge. All other instructions must take at least two cycles: one for opcode fetch, one for operation. Q $095) What did MOS Technologies manufacture befor introducing the 650X line of microprocessors? A $095) As stated above, it was calculator chips. Q $096) Three companies manufactured the 6502 under a cross-licensing agreement. Name them. A $096) Rockwell, MOS Technologies, and Synertek. Q $097) In NTSC-land, how fast does the 1MHz 6510 in the C64 actually run? A $097) 1.022727143 MHz. It is derived by taking the main clock frequency (14.31818MHz) and diving it by 14. Q $098) What about in PAL-land? A $098) 985.248449 kHz. It is derived by taking the main clock frequency (17.734472MHz) and dividing it by 18. Thus the PAL 64 actually runs slower than the NTSC one. Q $099) Data is latched into the 650X microprocessor on the (rising/falling) edge? A $099) Data is latched in to the 65XX on the falling edge of Phi0 (Phi1). The timing diagram in some books (64 PRG is one) is incorrect. Q $09A) Through the years, the 650X line has changed family numbers, yet the part has not been changed. (A family number is the upper 2 digits in this case) Name the other family numbers used by MOS to denote the 650X line. A $09A) the 75XX line used in the 264 series (Plus/4 and C16), and the 85XX series used in the C64C and C128 series. Q $09B) Consider the following code: ldx #10 lda $ff,x what location does the accumulator get loaded with? A $09B) The answer is location $ff+10 mod 256 = $09. The answer involves explaining a (mis)features of the NMOS 65XX CPU line. The above code instructs the 65XX CPU to use zero-page addressing mode to load the accumulator. In zero-page addressing, the address need only be one byte wide ($ff in this case), because the high byte is considered to be $00. Now, as humans, we would expect the CPU would add 10 to 255 ($ff), giving 265 ($109) as the address to load the accumulator from. However, the CPU designers decided that zero-page addressing means that the high byte will be $00 all the time, no exceptions. If a situation like the above occurs, the low byte of the addition will be used as the low byte of the address (9 in this case), but the high-byte will be ZERO. All zero page addressing modes work this way. Note that the CMOS versions of the 6502 do perform the high byte "fix-up", so this behavior is only seen on the NMOS parts. Q $09C) What about the following? ldx #10 lda ($ff),x A $09C) This was a trick. The code is trying to use INDIRECT INDEXED indexing mode using the x register, but that addressing mode can only be used with the y register. If the code is changed to the following, legal code: ldx #10 lda ($ff),y Then, the above discussion for zero-page addressing holds true here as well. The effective address would have been (hi:lo) $100:$0ff, but is instead (hi:lo) $000:$0ff. The simple rule is: zero page means exactly that. There is no way to address outside of zero-page with zero-page addressing. Q $09D) How many CPU clock signal lines does the 650X require to run? A $09D) 1. The 6501 used two, as the 6800 used two, but the 6502 and successors only required Phi0 (Phi1). Phi2 was generated on the CPU. Q $09E) Where does the 650X line fetch its first byte from after reset? A $09E) $fffc. The address formed by reading $fffd and $fffc is stuffed into the IP, and the code is read starting there. $fffc is read first, since the 65XX line stores addresses in low byte, high byte format. Q $09F) One of the original designers on the NMOS 6502 CPU now heads up Western Design Center in Arizona, and makes the 65C02 and 65C816 CPU chips. Name him. Hint: it is not Chuck Peddle! A $09F) Bill Mensch. He hand-designed these newer parts in the 65XX line in the same manner he and Chuck Peddle and others hand-designed the 6501 and 6502. Here are the answers to Commodore Trivia Edition #11 for October, 1994 Q $0A0) In the mid 1980's, Commodore introduced RAM Expansion Units for the Commodore 64, 64C, 128, and 128D. There were three of them. Give their model numbers, and what was different among them. A $0A0) The 1700 (128kB), the 1764 (256kB), and the 1750 (512kB). The 1700 and the 1750 were marketed for the 128, while the 1764 was marketed from the 64 line. Q $0A1) Some of the CIA integrated circuits used on the C64 and C128 computers have a hardware defect. What is the result of this defect, and when does it occur? (May be more than one, but I need only one) A $0A1) The only one I have documented in front of me is the timer B interrupt bug, which is explained in the "Toward 2400" article by George Hug in Transactor 9.3. (1) However, I had many people relate other bugs (2 and 3), which I haven't been able to test, so I add them as possibilities. (I encourage readers to confirm/deny the latter 2.) 1) If timer B of the 6526 CIA times out at about the same time as a read of the interrupt register, the timer B flag may not be set at all, and no interrupt will occur if timer B interrupts were turned on. 2) When the hour on the TOD clock is 12, the AM/PM must be reversed from its normal setting to set/reset the AM/PM flag. 3) The TOD clock sometimes generates double interrupts for alarm trigger. Q $0A2) Name the Commodore machine(s) on which a Intel 8088 was an OPTIONAL coprocessor. (Hint, not the IBM clones) A $0A2) I was looking for the B series computers, which contains the B computers (B128, B256), as well as the 600 series and the 700 series. These computers could be fitted with an optional 8088 processor on a separate card. However, another correct answer is the Amiga, which can have a 8088 attached via an expansion card or a SideCar(tm) unit. Q $0A3) On Commodore computers beside the Plus/4 series, there are three frequencies used to record the data on the tape. Name the frequencies used. A $0A3) 1953.125Hz, 2840.909Hz, and 1488.095Hz. These correspond to waveforms with periods: 512us, 352us, and 672us, respectively. Q $0A4) Commodore Plus/4 series computers can not read any cassettes recorded on other Commodore computers. Why? (Hint: It has nothing to do with the nonstandard connecotr on the Plus/4) A $0A4) The tones recorded on the Plus/4-C16 are exactly one-half the frequencies shown above. This suggests to many that the Plus/4 and C16 were supposed to run at twice its present frequency, but were downgraded at the last-minute, and the code to generate the tones was not updated to reflect the change. This is just heresay, so you decide for yourself. Q $0A5) During power-up, the Commodore 64 checks to see if it running in PAL-land or NTSC-land. How does it determine its location? A $0A5) It sets the raster compare interrupt to go off at scan line 311. If the interrupt occurs, we are on a PAL system, since NTSC will never get to line 311 (NTSC only has 262.5 lines per frame, every other frame shifted down a bit to create 525 lines). Q $0A6) What is the 65XX ML opcode for BRK? A $0A6) $00, or 00 Q $0A7) On the 65XX CPU, what gets pushed onto the stack when an interrupt occurs? A $0A7) The program counter gets saved high byte first, then the processor status flags get saved. Q $0A8) Speaking of the stack, where is the stack located in the 65XX address map? A $0A8) $0100 to $01FF Q $0A9) On the 65XX CPU line, it is possible to set and clear a number of processor status flags. Examples include SEC and CLC to set and clear the carry flag. What flag has a clear opcode, but no set opcode? A $0A9) The overflow flag: V. However, the V flag can be set via an external pin on some members of the 65XX line. The 1541 uses this as an ingenious synchronization tool. Q $0AA) When saving a text file to tape, the computer records 192 bytes of data, an inter-record gap, and then the same 192 bytes of data again. How wide is this inter-record gap, and why is it there? A $0AA) Some terminology: "inter" means "between". Most everyone knows that a tape block is recorded twice on the tape, but Commodore considers the two copies and the gap between them a single "record". Thus, this question is referring to the gap in between two dissimilar records. With that in mind, the interrecord gap is nominally 2 seconds long, (or 223.2 byte lengths, although the gap contains no data). It is there to allow the tape motors to get up to speed before the next data comes under the read/write head. The tape motors may need to stop between records if the program is not requesting any more data from the tape data file at this time. If the program subsequently asks for data from the tape, the drive must get up to speed before the read can occur. Note: on the first version of PET BASIC, the gap was too small, so programmers had problems retrieving data files. For completeness, the "intra-record" gap (The one between the two copies of the data) consists of 50+ short pulses, each of which is 352us in length, giving a timing of .0176s+. This time was used to copy important data to safe locations, reset pointers, and do error logging. The entire "record" is recorded in 5.7 seconds. Q $0AB) On an unexpanded VIC-20, where does the screen memory start? A $0AB) $1e00, or 7680 Q $0AC) In Commodore BASIC, what is the abbreviated form of the "Load" command? A $0AC) lO (L SHIFT-O) Q $0AD) In Commodore BASIC, what is the abbreviated form of the "List" command? A $0AD) lI (L SHIFT-I) Q $0AE) On the Commodore 64, there is section of 4 kilobytes of RAM that cannot be used for BASIC programs. It is the favorite hiding places for many ML programs, however. What is its address in memory? A $0AE) $c000, or 49152 Q $0AF) What is stored at locations $A004-$A00B, and why is it strange? A $0AF) The text "CBMBASIC" is stored there. It is strange because this text is not referenced by any routine. It can also be called strange because the code is Microsoft's. Doesn't it make you wonder? Here are the answers to Commodore Trivia Edition #12 for November, 1994 Q $0B0) What will happen if you type ?""+-0 into the CBM BASIC interpreter on the PET series, the 64 series, or the 128 series? A $0B0) The BASIC interpreter has a bug in it that shows up while interpreting the above statement. The interpreter leaves two bytes on the CPU stack prior to returning from a subroutines call. At least on the C64, the two bytes are both zeros. Since subroutines put the return address on the stack, the return retrieves the two bytes left on the stack and attempts to se that as the return address. So, depending on what code it executes after the return, it can do a number of things. Most of the time after the bug occurs, the interpreter limps along for a while until it hits a BRK instruction, $00. Then, that instruction causes the system to execute an interrupt. On the C64, the system vectors through $316-$317 (BRK vector) and does a warm start. On the C128 and PETs with Monitors, the system dumps into the internal machine language monitor. If the machine under use did not do something with the BRK vector, the machine will hang. Now, note that the above is not the only result. Since the interpreter is executing code from the wrong location, any result from no effect to hung machine is possible. Note that this is NOT normal behavior. The system should report an error while interpreting the above statement. Q $0B1) In the first CBM 64 units, what color was the screen color RAM changed to when you cleared the screen? A $0B1) The screen color RAM was changed to value 1 when the screen was cleared. Thus, when a byte was poked into screen RAM, the resulting character was white on the screen. The white contrasted nicely with the normal blue background. Q $0B2) Why was it changed in later versions of the 64? A $0B2) Commodore found that this practice sometimes caused "light flashes" during screen scrolls. I was going to leave this for another time, but ... The change was to make the color RAM equal to background color register #0. Well, this got rid of the "light flashes", but then poking values to screen RAM caused invisible characters, since the foreground color of the character was the same as the background color of the screen. Well, this broke a number of older programs that did not properly initialize the color RAM. Also, Commodore fixed the problem with the VIC-II that had caused these "light flashes" So, Commodore changed the KERNAL a third time. Since the above change caused invisible characters, Commodore made a third revision that changed the color RAM to the value in location 646 (the current cursor foreground color). Q $0B3) What is "special" about the text that displays the "illegal quantity error" in CBM BASIC? A $0B3) The text is actually "?ILLEGAL QUANTITY ERROR". Notice the two spaces between "QUANTITY" and "ERROR". John West supplies the expanantion: "The vector at $0300 points to a routine at $A43A, which is the general error message printing routine. Load .X with the number of the error, and it prints it. it looks up the address of the error text from a table, then prints the text, which does not have any trailing spaces. It then prints ' ERROR', with *2* spaces. It does this for all errors." Historically, this effect is caused by the VIC-20, which only had 22 columns. When the VIC-20 BASIC was being ported from the PET BASIC code, someone noticed that the some of the error strings would span two VIC-20 lines. So, the BASIC error messages were changed a little, so that they all printed neatly on two lines: The PET error string: ?ILLEGAL QUANTITY ERROR (one space) became: ?ILLEGAL QUANTITY ERROR (carriage return plus one space). When the C64 BASIC was being ported from the VIC-20, the carriage return was replaced with a space character. I admit this caught me by surprise. I have used Commodore computers for years, and never noticed that "?SYNTAX ERROR" had 2 spaces in it. Q $0B4) On what Commodore machine was the operating system OS/9 available? A $0B4) Since OS/9 was a real-time operating system for the 6809 microprocessor, it was available on only one Commodore machine, which had two different names: The Commodore SuperPET. The machine was sold as the "MMF (Micro MainFrame) 9000 in Germany, and its model number was SP9000. Q $0B5) Which Commodore machine(s) does not have a user port? A $0B5) There were a number of answers to this question, and there may be more: The Commodore C16. Commodore decided to cut out telecommunications, and thus designed the user port out of the computer, as the modem is the only use Commodore ever made of the user port. This also includes the C116, a version of the C16 with a chicklet keyboard. The Commodore Ultimax/MAX machine. This was the ill-fated game console produced in the early 80s. It was basically a stripped down Commodore 64. The 64 GS (Game System). This machine was another flop produced in the late 80s. Q $0B6) How many pins are there in a Commodore Serial Connector? A $0B6) 6. Q $0B7) There are 13 addressing modes available on the 6502. Name them. A $0B7) No# Name Description --- ------------ ----------- 01) accumulator asl a 02) immediate lda #$00 03) zero page lda $00 04) zero page,X lda $00,X 05) zero page,Y lda $00,Y 06) absolute lda $1000 07) absolute,X lda $1000,X 08) absolute,Y lda $1000,Y 09) implied clc 10) relative bne 11) (indirect,X) lda ($00,X) 12) (indirect),Y lda ($00),Y 13) (absolute indirect) jmp ($1000) Q $0B8) If you were to put one large sequential file onto an 8050 disk drive, how big could that file be? A $0B8) According to the 8050 User Manual, a sequential file could be 521208 bytes in size. Q $0B9) How many characters can be present in a standard Commodore DOS filename? A $0B9) 16 characters. Q $0BA) How many pins does a 6502 IC have on it? A $0BA) 40 pins. Q $0BB) How many pins does the standard IEEE-488 connector have on it? A $0BB) 24 pins. Q $0BC) On the IEEE-488 bus, what does the acronym for pin 7, NRFD, stand for? A $0BC) Not Ready For Data. Q $0BD) On the NMOS 6502, what is the ML opcode for SED, and what does this opcode do? A $0BD) $f8, SEt Decimal mode. Sets the D flag in the status flags byte. Although used rarely, this opcode switches on Binary Coded Decimal mode. In BCD mode, the byte $10 is treated as 10, not 16. The add and subtract instructions are the only legal ones affected by this mode, although some undocumented/illegal opcodes are also affected. For example, in this mode, adding the byte $15 (21) to the byte $25 (37) yields $40 (64) not $3a (58). emember that, in this mode, $40 = 40, not 64. Q $0BE) Assuming a PET computer and a non-PET computer have access to a common disk drive or tape drive, there are two ways to load a PET BASIC program on the non PET CBM computer. Name them. A $0BE) Most differing series of Commodore computers had different places for the start of BASIC programs. For instance, on the C64, $0801 (2049) is the start of BASIC memory, but most PET computers start BASIC memory at $0401 (1025). This wouldn't matter, except that BASIC programs are stored on tape and disk with the start address, and the line links in a BASIC program have absolute addresses in them. To fix these problems, the Commodore VIC-20 and newer computers came out with a "relocatable load". So, here are the two choices: 1) Save the program on the PET like so: save "name",X (X is device). Then, you could load the program into the non-PET machine by using a relocatable load: load "name",X. This would load the program in at start of BASIC memory and refigure the line links. 2) Redefine start of BASIC memory on non-PET machine. A couple of pokes to relevant BASIC pointers, and the start of BASIC was moved. Then, load the program non-relocatable. Now, from the above discussion, it looks like option 1 is the simplest route. Well, it would be, exept for one small detail: Earlier PET computers saved the BASIC program from $0400, not $0401 as is expected. The effect: loading relocatable on a non-PET would have a zero byte as the first byte of the program. The quick fix: change BASIC pointer to itself-1, load PET program, reset BASIC pointer. Commodore didn't make it easy! Q $0BF) Only one of the ways detailed in $0BE works the other way around. Which one? A $0BF) Since the earlier PET computers did not have a "relocatable load", the only way to load a program from, say, a C64 into an 2001 was to use option #2 above and move the start of BASIC memory to $0801 (2049). Commodore Trivia Edition #13 Q $0C0) The early 1541 drives used a mechanism developed by ______. Name the company. Q $0C1) On later models, Commodore subsequently changed manufacturers for the 1541 drive mechanism. Name the new manufacturer. Q $0C2) What is the most obvious difference(s). (Only one difference is necessary) Q $0C3) On Commodore BASIC V2.0, what answer does the following give: PRINT (SQR(9)=3) Q $0C4) In Commodore BASIC (Any version) what does B equal after the following runs: C=0:B=C=0 Q $0C5) The first PET cassette decks were actually _______ brand cassette players, modified for the PET computers. Name the comapny. Q $0C6) In Commodore BASIC (Any version), what happens if the following program is run: 10 J=0 20 IF J=0 GO TO 40 30 PRINT "J<>0" 40 PRINT "J=0" Q $0C7) In question $068, we learned how Jack Tramiel first happened upon the name "COMMODORE". According to the story, though, in what country was he in when he first saw it? Q $0C8) On the Commodore user port connector, how many edge contacts are there? Q $0C9) On most Commodore computers, a logical BASIC line can contain up to 80 characters. On what Commodore computer(s) is this not true? Q $0CA) If a file is saved to a Commodore Disk Drive with the following characters: chr$(65);chr$(160);chr$(66), what will the directory entry look like? Q $0CB) What is the maximum length (in characters) of a CBM datasette filename? Q $0CC) How many keys are on a stock Commodore 64 keyboard? Q $0CD) Commodore BASIC uses keyword "tokens" to save program space. Token 129 becomes "FOR". What two tokens expand to include a left parenthesis as well as a BASIC keyword? Q $0CE) There are 6 wires in the Commodore serial bus. Name the 6 wires. Q $0CF) On the Commodore datasette connector, how many logical connections are there? Some are easy, some are hard, try your hand at: Commodore Trivia Edition #13! Jim Brain brain@mail.msen.com 602 North Lemen (New address) Fenton, MI 48430 (810) 737-7300 x8528 ============================================================================== A Different Perspective, part II by George Taylor (aa601@cfn.cs.dal.ca) and Stephen Judd (sjudd@nwu.edu). We... are... VR Troopers! Okay Troopers, once again we need to make an excursion out of the three dimensional world and into our own little virtual world inside the C64. So sit back in your virtual chair, put on your virtual thinking helmet, maybe grab a virtual beer, and prepare for a virtually useful experience with another virtually humongous article. Last time we laid down the foundations of 3D graphics: rotations and projections. In this article we will build upon this foundation with a look at hidden surfaces as well as filled surfaces. In addition we will snaz up the old program so that it is a little more efficient by for instance introducing a much faster multiplication routine and moving all variables into zero-page. To get us in the mood let's review from last time. We are in a three-dimensional space; in particular, a right-handed three-dimensional space, so that the x-axis comes towards you, the y-axis increases to the right, and the z-axis increases "up". Now we have some object, centered at the origin. To rotate the object we derived a 3x3 matrix for each axis which describes a rotation about that axis. After rotating we translate the object along the z-axis and then project it through the origin onto a plane z=constant. As you recall the projection of a point is done by drawing a line from the point through the origin, and then figuring out where this line intersects our plane z=constant. You can think of this line as a ray of light bouncing off the object and through our little pinhole camera lens. Clearly for any solid object some parts of the object will remain hidden, though, i.e. when you look at your monitor you can't see the back of it, and you probably can't see the sides. How do we capture this behavior mathematically? Hidden Surfaces --------------- Imagine our object with some light shining on it -- when will a part of the object be hidden? Clearly it is hidden when the light reflected off of it never reaches our eyes, which happens whenever a part of the object is "turned away" from us. How do we express this mathematically? Consider a flat plate, like your hand (you also might think of a cube). Now imagine a rod sticking out of the plate, exactly perpendicular to the plate (take your index finger from your other hand, and touch it to your palm at a ninety-degree angle). Now rotate the plate around, and imagine the light bouncing off and heading towards your eyes. No matter where you place your hand in space, the very last point at which it is visible is when it is exactly parallel to the light rays coming from it to your eyes; or, to put it another way, when the light rays are exactly perpendicular to a normal vector to the surface (in the above case this vector is either a rod or your finger). If the angle between the normal and a light ray is less than ninety degrees, then the surface is visible. If greater, then the surface is invisible. At this point you may be wondering how to figure out the angle between two vectors. It turns out we really don't have to calculate it at all: instead we use a very important tool in our mathematical toolbox, the dot product. If we have two vectors v1=(x1,y1,z1) and v2=(x2,y2,z2) then the dot product is defined to be v1 dot v2 = x1*y1 + x2*y2 + x3*y3 note that this is a _scalar_ (i.e. a number), and not a vector. You can also show that v1 dot v2 = |v1|*|v2|*cos(theta) where | | denotes length and theta is the angle between the two vectors. Since cos(theta) is positive or negative depending on whether or not theta is less than or greater than ninety degrees, all we have to do is take the dot product and look at the sign. But we need to understand something about the dot-product. theta is the angle between two vectors joined at their base; mathematically the way we are going to draw the light ray is to draw a line FROM the origin TO a point on the surface. In our model above, we are going to draw a line from your eyes to the palm of your hand and then slide the normal vector down this line until the base of the normal vector touches your eye. The whole point of this is that when we look at the dot product we need to keep in mind that if the dot product is negative, the face is visible. All that remains is to write down an equation: let's say that we've rotated the surface and know a point P=(x,y,z) on the rotated surface, and we have a normal vector to the surface vn=(vx,vy,vz). First we need to translate down the z-axis so that P -> (x,y,z-z0) = P - (0,0,z0). If we then take the dot product we find that P' dot vn = (P dot vn) - z0*vz But (P dot vn) is simply a constant: because these are rigid rotations the length of P never changes, presumably the length of vn never changes, and the angle between the two never changes. So introduce a constant K where K = (P dot vn)/z0 so that all we need to do is subtract the z-component of the normal vector from K and check if it is positive or negative: if negative, the face is visible. Note that if we translate by an amount P + (0,0,z0) (instead of - (0,0,z0)) we simply add the two together. We seem to have left something out here: how do we calculate the normal vector vn? One way to do it is by using another vector operator, the cross-product. The dot product of two vectors is just a scalar, but the cross product of two vectors is another vector, perpendicular to the first two. The most common way to visualize the cross-product is by using your right hand: imagine two vectors in space, and place your right hand along one of them, with your thumb sticking out. Now curl your fingers towards the other vector. Your thumb points in the direction of the vector formed from the cross-product of the first two. You can easily convince yourself then that (A x B) = -(B x A), that is, if you reverse the order of the cross product, you get a vector pointing in the opposite direction. Therefore, if we take any two vectors in the face (in particular, we know the edge of the face), and then take their cross-product, we have a normal vector. But because we are dealing with a cube, we have an even easier method! We can use the fact that the faces on a cube are perpendicular to each other: if we take two points and subtract them we get a vector going between the two points. On a cube, this will give us a normal vector if we use two "opposite" points. Therefore all we need to do is rotate the cube, subtract two z-coordinates, add to K, and check if it is positive or negative. This is how the program does it, and the specifics will be explained later. Right now I want to show you a second method of hidden surface detection. Instead of using the three-dimensional rotate vectors, what if we use the two-dimensional _projected_ vectors? If we take the cross-product of two of these vectors we get a vector which either points into the screen or out of it, which corresponds to a positive or a negative result. The cross-product is usually done by taking the determinant of a matrix. I am not going to explain that here -- you can look in any decent calculus book for the full cross-product. All we really care about is the z-coordinate of the vector, and the z-coordinate of v1 x v2 is: v1x*v2y - v1y*v2x Whether or not the face is visible depends on how you define v1 and v2! Always remember that (v1 x v2) = -(v2 x v1). What is this quantity anyways? Consider a parallelogram made up of our two vectors v1 and v2. The magnitude of the cross-product just happens to be |v1|*|v2|*sin(theta) which you can easily see is the area of a parallelogram with sides v1 and v2. For this reason the second method apparently goes by the name SAM -- Signed Area Method. (Now you need to think about the interpretation of the dot product in a similar way). Note that the second method is quite general, while the first method only works for objects which have perpendicular surfaces (at least, in it's current form presented here). On the other hand, the first method is significantly faster. Now that we've hidden the faces, it's time to fill them: Filled Faces ------------ Q: How do you make a statue of an elephant? A: Start with a block of granite and carve away everything that doesn't look like elephant! The first method of filling faces is very simple in concept. Let's say we want a cube with white faces and black edges. Before, the program would make the buffer black and then draw in the white edges. The idea here is to make the entire buffer white, draw the edges in black, and then make everything outside of the edges black. Quite simply, we start with a solid block and then take away everything that doesn't look like a cube! You can also think of it like a cookie cutter: we press our cube-shaped cutter down and remove all the dough outside of the cutter. This simplistic method actually has some advantages. If the object is very large, we spend very little time doing the actual un-filling. We don't care about how complicated the object is, because we just trace out the edge. Finally, this gives us an extremely easy way of implementing a rudimentary texture-mapping in multicolor mode. For instance, instead of coloring the block white, what if we used a changing pattern of colors? As long as the edge is a specific color, the pattern can be any combination of the other three colors. An example program which does just this is included -- note that the inititalization program needs to be changed slightly to run this program. In other words, we roll the dough, draw a pattern into it, press our cutter down and remove the outside dough. We are left with a cube with patterns all over it. On the downside it's not quite so easy to do things like have each face a separate color (but who wants wimpy separate colors when you can have evolving texture patterns, eh? :). The program makes a few refinements to this technique. For instance, instead of coloring the entire buffer white, it calculates ahead of time the minimum and maximum values for y, and only colors that part of the drawing area white. For the sake of completeness, here is another method of filling: exclusive-or. A clever way of filling faces is to use some EOR magic. Let's say we want to fill everything between two points A and B. We want to start filling at point A and stop at point B, and since EOR is a bit flipper this gives us a means of filling. Consider the following situation in memory: 00010000 <-- Point A 00000000 00000000 00010000 <-- Point B Now consider the following little piece of code: LDA #00 EOR A STA A EOR A+1 STA A+1 EOR A+2 STA A+2 EOR A+3 ;point B The result is: 00010000 00010000 00010000 00010000 This is the conceptual idea behind an EOR-buffer. Pretty neat, eh? But we can't just implement this as-is. In fact we have a whole slew of things to worry about now. Try EORing a vertical line. What about when two lines share a single pixel at their intersection? What happens in color? Ah reckon y'all will just have to wait until next time tuh see :). Da Program ---------- Let's review the code. We check to see if we should increase or decrease the rotation rate (or quit), and then update the angles. Next we calculate the rotation matrix using a table of sines and cosines. Then we rotate and project the points by using a table of d/(z/64-z0) values. Somewhere in there we clear a working buffer, draw all of the lines, swap the buffers, pass Go, collect $200 (actually, considering where the buffers are located we either collect $300 or $380 :), and go around the loop again. First, some bugs. There were two places in the line drawing routine where an SBC was performed with the carry clear when it should have been set, so we need to add some SECs in there. Somewhere there is a strange bug related to y-rotations, but I didn't track it down. Although not a bug, there is something to think about. On the computer, x increases to the right, and y-increases downwards, with z coming out of the screen. But this is a left-handed coordinate system, and all our calculations were performed in a right-handed coordinate system. What this means is that one of our coordinates is actually a mirror-image of what it should be, while the other coordinate is where it is supposed to be. Remember that a projection generates a negative mirror-image of the object -- the computer coordinate system mirrors a single axis of the image again! Because of the symmetry of a cube, this makes no difference. A smart way to fix this is to translate the object in _front_ of the projection plane, i.e. to use the translation z=z+c instead of the currently used z=z-c, but still project through the origin and into the plane z=1. Since I am not particularly smart though, not to mention lazy and unmotivated, I didn't bother to fix this. Before we start adding the new stuff like hidden surfaces into the code, why don't we think about doing some simple optimizations to the old code? One really easy thing to fix is in the projection routine. You will recall that the earlier program rotated z and then added 128 to it to use as an index. Why bother to add 128 at all? I dunno -- sometimes things seem like a good idea at the time. So that's something to fix. It's not that it's a big waste of time, it's just one of those annoying things that there's no reason for. How about the variables? They're all just sitting at the end of the program -- why not move them all into zero page? Sounds good to me! We just need to make sure we don't use any sensitive locations in zero page that will hose the whole computer. So now that's fixed. On the C64 an interrupt is performed every 60th of a second which scans the keyboard and things like that -- why in the world do we want that running in the middle of all our calculations? I dunno -- let's turn it off (but turn it back on before checking to see if F1 etc. was pressed!). A footnote observation: when the rotation matrix is calculated, two macros are used (MUL2 and DIV2) which multiply and divide a signed number by two. It never ceases to amaze me what happens when you simply sit down and think about something, and in this case these two macros can be made much simpler: MUL2 ASL ;That's all, folks DIV2 CLC BPL :POS SEC :POS ROR These two routines will multiply/divide a signed 2's complement number by two (note that the source included with this article uses the old method). There's the easy stuff to fix. What about the calculations themselves? The rotation is pretty straightforward -- nah, skip that. The line drawing routine takes up an awful lot of time -- maybe we can speed that up? That's for a future article :). Clearing the buffer takes a lot of time, but now that we're going to have filled faces there isn't too much we can do about that. In fact, so much more time is spent in those two areas than is spent in other parts of the code that any other optimizations we make really aren't going to make a very big difference... BUT... How about multiplications? Fast Signed Multiply -------------------- Ah, now here is something we can fix. Consider the following function: f(x) = x*x/4 Now notice that f(a+b) - f(a-b) = a*b Wowsers! All we need to do is have a table of squares, and we can do a multiplication in no time! Whoa there, wait a minute, all of our calculations are using signed numbers. Won't that make a difference? Well, the above calculation is completely general -- I never said what the sign of a and b are. The fact that we are using two's complement notation makes this even simpler! Recall that our multiplication is x -> x * [d/(z0-z/64)] where x is a signed floating point number multiplied by 64 (that is, instead of going from -1 to 1 x would go from -64 to 64). Previously we made d large, so that the table of d/(z-z0) would be more accurate. Then we multiplied the numbers together and divided by 64, a procedure which took between 150 and 180 cycles, leaving us with a signed, 8-bit result. Well, that's easy to duplicate. From our first equation above, we see that (a*b)/64 = [ f(a+b) - f(a-b) ]/64 = g(a+b) - g(a-b) where g(x) = x*x/256. In other words, if we modify our table slightly, we get exactly the result we want. So here is the code to multiply two numbers together: * A*Y -> A Signed, 8-bit result STA ZP1 ;ZP1 -- zero page pointer to table of g(x) EOR #$FF CLC ADC #$01 STA ZP2 ;ZP2 also points to g(x) LDA (ZP1),Y ;g(Y+A) SEC SBC (ZP2),Y ;g(Y-A) And that's it -- we're done. The above takes 24-26 cycles to execute -- not bad at all! Yes, with another table we could make it even faster, but this is good enough for us. At the moment we don't do very many multiplications, but in the future, when we write a generalized routine to rotate and project an arbitrary object, this will give us a humongous time savings. Astute readers may be thinking ahead here: in the program, for each projection we have two multiplications, x=x*c and y=y*c, where c is the same in both cases. So if we store c in ZP1 and ZP2, we can make the multiplication even more efficient, right? The answer is yes, but only by being extremely careful, for reasons that will be detailed in exactly two paragraphs. BUT WAIT! We have to think about a few things here. What happens when we multiply, say, -1 * -1. In two's complement notation -1 is equal to 255. So our above algorithm adds 255 to 255 to get an index into the table and gets... oops! Our table needs to be larger than 256 bytes! In fact this is very easy to fix, because of the way two's complement works. All we need to do is put an exact copy of the 256 byte table on top of itself, and the table will work fine. (If you look at the initialization program you will notice that the statement is: q%=s*s:poke bm+j,q%:poke bm+j+256,q%). BUT WAIT!!! What kinds of numbers are we multiplying together here? Our vertices start out at the points (+/-1,+/-1,+/-1). Our rotations correspond to moving these points around on a sphere, so it is easy to see that the largest rotated value we can have is sqr(3), the radius of this sphere. Since we are multiplying these numbers by 64, the largest value we can have for these numbers is 64*sqr(3) = 111. Okay, no big whoop, what are the values for d/(z0-z/64) anyways? Well, for z0=5 and d=150 say we get values like 28... ACK! When we go to multiply we are going to add 111 to 28 and get 137, but in two's complement notation this is equal to -119. Example: a=28 b=111 f(b+a) = f(137) = f(-119) in two's-complement notation f(b-a) = f(83) In our table lookup we really want 137*137 but we are going to get -119*-119! One option is to never choose d very large so that we don't have this problem, but the solution turns out to be much simpler, again due to the way two's complementing works. We can see that we can get numbers larger than 127 when we add the two multiplicands together. What is the _smallest_ number we will come up with? Certainly the smallest x is going to get is -111. Ahhh... d/(z0-z/64) is always positive, so when we add them together we will get something larger than -111, which in two's complement notation is 145. This means that we can treat the table entries between 127 and at least 145 as positive numbers instead of two's complement negative numbers, and everything will work out great. Incidentally, fudging this table provides an easy way to add pretty cool special effects. The initialization program sets up the math table using the following line: [for j=0 to 255] 290 S=J:IF S>150 THEN S=256-S [poke bm+j,S*S] Try changing the inequality from S>150 to S>120 (or S>127, where it would be for a two's complement table), and see what happens! And this is why we can't store d/(z0-z) in the pointers ZP1 and ZP2 -- if we did, then for a given multiplication we could get numbers larger than 127 and smaller than -128, and our clever table would no longer work right. We can still get around this -- all we need is two clever tables, one for the positive d/(z0-z) and one for negative d/(z0-z). For the first table, we have the situation outlined above: no numbers smaller than -90 or so, and numbers possible larger than 127. For the second table we have the reverse situation: no numbers larger than 90 or so, but possible numbers less than -128. Since we are using two pointers anyways (ZP1 and ZP2), this is not difficult to implement. The end result is that you can do the entire projection in around 36 cycles if you so desire. 36 cycles? Note that for the second table the code does something like EOR #$FF; CLC; ADC #$01. Well, if we set up the second table as f(x)=(x+1)^2/4 then we have included the CLC and ADC #$01 into the table, so the instructions can be removed. The entire projection routine is then: ... (rotate z) STA ZP1 EOR #$FF STA ZP2 ... (rotate x) TAY LDA (ZP1),Y SEC SBC (ZP2),Y ;Now A contains projected X ... (rotate y) TAY LDA (ZP1),Y SEC SBC (ZP2),Y Looks like 36-40 cycles to me! The program doesn't implement this -- it only uses a single table, and repeats the STA ZP1 stuff at each step. A few cycles wasted won't kill us (there are plenty of cycles wasted in the code), and it is probably tricky enough to follow as it is. You might be asking, what is the true minimum value for a given z0 and d? Well, I tried writing down a set of equations and minimizing according to some constraints, and I ended up with a sixth-order polynomial which I had to write little newton-iteration solver for. In other words, I don't think you can write down a simple function of d and z0 to give the table boundaries. I found 150 to be a perfectly reasonable number to use. Incidentally, this is why the projection was not changed to z=z+c -- I didn't want to go fiddling around with it again. Maybe next time :). ONE MORE THING!!! This is very important. The math table MUST be on an even boundary for the above algorithm to work correctly. This one is easy to get bit by. Logarithmic Multiplication -------------------------- As long as we're talking about fast multiplication here, it is worthwhile to mention another method for multiplying two numbers together. To understand it you need to understand two important properties of logarithms: log(x*y) = log(x) + log(y) log_b(x) = y <=> b^y = x These are a reflection of the fact that logarithms are inverses of exponentiation. So you can see that another way to multiply two numbers together is to take their logs, add, and then exponentiate the result. So you could have a table of log_2 (base 2 logarithms) and another table of 2^x, and do a multiplication very quickly. (Actually, you'd want a table of 32*log_2(x), since log_2(256)=8). Why wasn't this method used? First, dealing with signed numbers is much trickier -- the logarithm of a negative number is a complex (i.e. real+imaginary) number, complete with branch cuts. You can get around this by setting up the tables in a special way (for instance by letting log(-x)=-log(x)) and putting in some special handling, but it isn't as efficient as the algorithm used in the program. Second, accuracy decreases significantly as x and y get large, so that for an eight-bit table of logarithms you will often get an answer that is off by one or more. You can in fact get around this problem by using some sneaky manipulation -- if you are interested in seeing this, contact us! But it is worthwhile to keep this method in mind if you need a really fast multiplication and you aren't too worried about accuracy. Christopher Jam (phillips@ee.uwa.edu.au) has come up with an interesting variation on this method. It calculates 64+64*x/z and uses a slightly different structure for the signed numbers, and runs almost as fast as the method used by the program -- contact him for more information if you're interested. Hidden Surfaces --------------- The remainder of this follows right from the discussion section. In the program the cube vertices are labeled as P1 = 1,1,1 P2 = 1,-1,1 P3 = -1,-1,1 P4 = -1,1,1 P5 = 1,1,-1 P6 = 1,-1,-1 P7 = -1,-1,-1 P8 = -1,1,-1 and the faces are chosen to be Face 1: P1 P2 P3 P4 6: P5 P6 P7 P8 Face 2: P1 P2 P5 P6 5: P3 P4 P7 P8 Face 3: P1 P4 P8 P5 4: P2 P3 P6 P7 (think of it as a six-sided dice, with six opposite of one, etc.). The normal vectors are then Face 1: P1-P5 Face 2: P1-P4 Face 3: P1-P2 This means that we need to store the z-coordinates for points 1,2,4, and 5. Note that the opposite faces have exactly opposite normal vectors, so that for instance the normal vector for face 6 is P5-P1, the negative of face 1. Here is something to consider: when one face is visible, the opposite face cannot be visible! Because of the way projections work, though, the converse is not true; it is entirely possible to have two opposite faces invisible. To prove this to yourself just look at your favorite box, like your monitor, straight-on, and notice that you can't see the sides! All that the program does is subtract z-coordinates and add them to the constant K, and check the sign. Unfortunately we can have a positive overflow while adding stuff together (since these are signed numbers), and if we don't catch the positive overflow we will calculate a negative result when the result is actually positive! This will of course wreck the hidden surface removal. Filled Faces ------------ The program currently uses the first algorithm to fill faces, i.e. the cookie-cutter elephant-carving method. During the projections the program checks each value of y to find the minimum and maximum values for this plot, ymin and ymax. The program then clears the buffer up to and including ymin, fills the buffer from ymin+1 to ymax-1, and then clears the rest of the buffer. Why does it clear ymin and ymax? Because the only thing that can happen on those lines is an edge -- there is no point in filling these lines and then clearing them, since they will always be clear. By only filling the buffer between ymin and ymax, we save some time in removing the junk from the edges of the cube. Next, the cube is drawn. The background is black and the faces are white, i.e. our fill color is white. Clearly then we want to draw our lines in black. I could have reversed background and foreground colors and left the line routine as-is, but of course being the lazy programmer I am I decided instead to change the table BITP. You may recall that the earlier table had entries like %10000000 %01000000 etc. Now it has entries like %01111111 %10111111 etc., and instead of ORAing the values into the buffer, they are ANDed into the buffer. This then draws lines of zeroes into our buffer which is solid ones. Finally, to un-fill the outside of the cube the program simply goes through the buffer from ymin to ymax, coloring everything black until it hits a zero, i.e. an edge. At this point it calculates the appropriate pattern to clear up to the edge, and then does the same thing starting from the right hand side of the buffer. In other words it runs along a specific y-value coloring everything black until it hits the edge of the cube, and does this for all the relevant y-values. Texture Mapping --------------- More of a fill-pattern really. The program cube3d2.1.o does all of the above but in multicolor mode. Now instead of using a solid color to fill the buffer the program uses a series of colored lines -- really a very simple pattern. A much neater thing would be to have a pattern drawn out in a pattern buffer, and to copy that into the drawing buffer. Other things to try are colored squares which shift around. cube3d2.1.o is just a really quick hack, but at least it demonstrates the concept. MAKE SURE that you change the value of D from 170 to 85 if you try this program! Pixels are doubled now, so that resolution is cut in half. This is located at line 240 in INIT3D2.0 Memory Map ---------- The main program is located at $8000=32768 and is 3200 bytes long. $8000-$8C00 - Program $8C00-$8C80 - Bit position table $8C80-$8D00 - Table of sines $8D00-$8D80 - Table of cosines. $8D80-$8E80 - Table of d/(z0-z/64) $8F00-$9100 - Two 256-byte tables of g(x)=x*x/256 $3000 - First drawing buffer $3800 - Second drawing buffer INIT3D is a simple basic program to set up the tables. For INIT3D2.x the important setup routines are: lines 100-150 - Set up the trigonometric tables lines 233-310 - Set up the projection and mult tables 240 - Location of constants D and Z0 290 - Set table boundary for multiplication That's all -- until next time... Steve Judd George Taylor 12/2/95 This document is Copyright 1995 by Stephen Judd and George Taylor. Much like the previous one. It is also freely distributable. And here is the source code: ******************************** * * * Stephen Judd * * George Taylor * * Started: 7/11/94 * * Finished: 7/19/94 * * v2.0 Completed: 12/17/94 * * * * Well, if all goes well this * * program will rotate a cube. * * * * v2.0 + New and Improved! * * Now with faster routines, * * hidden surfaces, filled * * faces, and extra top secret * * text messages! * * * * This program is intended to * * accompany the article in * * C=Hacking, Jan. 95 issue. * * For details on this program, * * read the article! * * * * Write to us! * * * * Myself when young did * * eagerly frequent * * Doctor and Saint, and heard * * great Argument * * About it and about: but * * evermore * * Came out by the same Door * * as in I went. * * - Rubaiyat * * * * Though I speak with the * * tongues of men and of angles * * and have not love, I am * * become as sounding brass, or * * a tinkling cymbal. * * - 1 Corinthians 13 * * * * P.S. This was written using * * Merlin 128. * ******************************** ORG $8000 * Constants BUFF1 EQU $3000 ;First character set BUFF2 EQU $3800 ;Second character set BUFFER EQU $A3 ;Presumably the tape won't be running X1 EQU $FB ;Points for drawing a line Y1 EQU $FC ;These zero page addresses X2 EQU $FD ;don't conflict with BASIC Y2 EQU $FE DX EQU $F9 DY EQU $FA TEMP1 EQU $FB ;Of course, could conflict with x1 TEMP2 EQU $FC ;Temporary variables ZTEMP EQU $02 ;Used for buffer swap. Don't touch. Z1 EQU $22 ;Used by math routine Z2 EQU $24 ;Don't touch these either! K EQU $B6 ;Constant used for hidden ;surface detection - don't touch FACES EQU $B5 ;Used in hidden surfaces. YMIN EQU $F7 ;Used in filled faces -- as YMAX EQU $F8 ;usual, don't touch ANGMAX EQU 120 ;There are 2*pi/angmax angles * VIC VMCSB EQU $D018 BKGND EQU $D020 BORDER EQU $D021 SSTART EQU 1344 ;row 9 in screen memory at 1024 * Kernal CHROUT EQU $FFD2 GETIN EQU $FFE4 * Some variables TX1 = $3F TY1 = $40 TX2 = $41 TY2 = $42 P1X = $92 ;These are temporary storage P1Y = $93 ;Used in plotting the projection P2X = $94 P2Y = $95 ;They are here so that we P3X = $96 ;don't have to recalculate them. P3Y = $AE P4X = $AF ;They make life easy. P4Y = $B0 P5X = $B1 ;Why are you looking at me like that? P5Y = $B2 ;Don't you trust me? P6X = $B3 P6Y = $B4 ;Having another child wasn't my idea. P7X = $71 P7Y = $50 P8X = $51 P8Y = $52 P1Z = $57 ;These are z-coordinates P2Z = $58 ;We only need these four to check P4Z = $59 ;for hidden faces P5Z = $60 DSX = $61 ;DSX is the increment for ;rotating around x DSY = $62 ;Similar for DSY, DSZ DSZ = $63 SX = $64 ;These are the actual angles in x y and z SY = $65 SZ = $66 T1 = $67 ;These are used in the rotation T2 = $68 T3 = $69 ;See the article for more details T4 = $6A T5 = $6B T6 = $6C T7 = $6D T8 = $6E T9 = $6F T10 = $70 A11 = $A5 ;These are the elements of the rotation matrix B12 = $A6 ;XYZ C13 = $A7 D21 = $A8 ;The number denotes (row,column) E22 = $A9 F23 = $AA G31 = $AB H32 = $AC I33 = $AD *** Macros MOVE MAC LDA ]1 STA ]2 <<< GETKEY MAC ;Wait for a keypress WAIT JSR GETIN CMP #00 BEQ WAIT <<< *------------------------------- LDA #$00 STA BKGND STA BORDER LDA VMCSB AND #%00001111 ;Screen memory to 1024 ORA #%00010000 STA VMCSB LDY #00 LDA #TTEXT STA TEMP2 JMP TITLE TTEXT HEX 9305111111 ;clear screen, white, crsr dn TXT ' cube3d v2.0',0d,0d TXT ' by',0d HEX 9F ;cyan TXT ' stephen judd' HEX 99 TXT ' george taylor',0d,0d HEX 9B TXT ' check out the jan. 95 issue of',0d HEX 96 TXT ' c=hacking' HEX 9B TXT ' for more details!',0d HEX 0D1D1D9E12 TXT 'f1/f2',92 TXT ' - inc/dec x-rotation',0d HEX 1D1D12 TXT 'f3/f4',92 TXT ' - inc/dec y-rotation',0d HEX 1D1D12 TXT 'f5/f6',92 TXT ' - inc/dec z-rotation',0d HEX 1D1D12 TXT 'f7',92 TXT ' resets',0d TXT ' press q to quit',0d HEX 0D05 TXT ' press any key to begin',0d HEX 00 TITLE LDA (TEMP1),Y BEQ :CONT JSR CHROUT INY BNE TITLE INC TEMP2 JMP TITLE TXT 'This is a secret text message!' :CONT >>> GETKEY **** Set up tables(?) * Tables are currently set up in BASIC * and by the assembler. TABLES LDA #>TMATH STA Z1+1 STA Z2+1 **** Clear screen and set up "bitmap" SETUP LDA #$01 ;White STA $D021 ;This is done so that older LDA #147 ;machines will set up JSR CHROUT LDA #$00 ;correctly STA $D021 LDA #SSTART ;Row 9 STA TEMP1+1 ;SSTART points to row 9 LDA #00 LDY #00 LDX #00 ;x will count 16 rows for us CLC :LOOP STA (TEMP1),Y INY ADC #16 BCC :LOOP CLC LDA TEMP1 ADC #40 ;Need to add 40 to the base pointer STA TEMP1 ;To jump to the next row LDA TEMP1+1 ADC #00 ;Take care of carries STA TEMP1+1 LDY #00 INX TXA ;X is also an index into the character number CPX #16 BNE :LOOP ;Need to do it 16 times **** Set up buffers LDA #BUFF1 STA BUFFER+1 STA ZTEMP ;ztemp will make life simple for us LDA VMCSB AND #%11110001 ;Start here so that swap buffers will work right ORA #%00001110 STA VMCSB **** Set up initial values INIT LDA #00 STA DSX STA DSY STA DSZ STA SX STA SY STA SZ *------------------------------- * Main loop **** Get keypress MAIN CLI KPRESS JSR GETIN CMP #133 ;F1? BNE :F2 LDA DSX CMP #ANGMAX/2 ;No more than pi BEQ :CONT INC DSX ;otherwise increase x-rotation JMP :CONT :F2 CMP #137 ;F2? BNE :F3 LDA DSX BEQ :CONT DEC DSX JMP :CONT :F3 CMP #134 BNE :F4 LDA DSY CMP #ANGMAX/2 BEQ :CONT INC DSY ;Increase y-rotation JMP :CONT :F4 CMP #138 BNE :F5 LDA DSY BEQ :CONT DEC DSY JMP :CONT :F5 CMP #135 BNE :F6 LDA DSZ CMP #ANGMAX/2 BEQ :CONT INC DSZ ;z-rotation JMP :CONT :F6 CMP #139 BNE :F7 LDA DSZ BEQ :CONT DEC DSZ JMP :CONT :F7 CMP #136 BNE :Q JMP INIT :Q CMP #'q' ;q quits BNE :CONT JMP CLEANUP :CONT SEI ;Speed things up a bit **** Update angles UPDATE CLC LDA SX ADC DSX CMP #ANGMAX ;Are we >= maximum angle? BCC :CONT1 SBC #ANGMAX :If so, reset :CONT1 STA SX CLC LDA SY ADC DSY CMP #ANGMAX BCC :CONT2 SBC #ANGMAX ;Same deal :CONT2 STA SY CLC LDA SZ ADC DSZ CMP #ANGMAX BCC :CONT3 SBC #ANGMAX :CONT3 STA SZ **** Rotate coordinates ROTATE *** First, calculate t1,t2,...,t10 ** Two macros to simplify our life ADDA MAC ;Add two angles together CLC LDA ]1 ADC ]2 * Use two trig tables to remove the below CMP etc. code CMP #ANGMAX ;Is the sum > 2*pi? BCC DONE SBC #ANGMAX ;If so, subtract 2*pi DONE <<< SUBA MAC ;Subtract two angles SEC LDA ]1 SBC ]2 BCS DONE ADC #ANGMAX ;Oops, we need to add 2*pi DONE <<< ** Now calculate t1,t2,etc. >>> SUBA,SY ;SZ STA T1 ;t1=sy-sz >>> ADDA,SY ;SZ STA T2 ;t2=sy+sz >>> ADDA,SX ;SZ STA T3 ;t3=sx+sz >>> SUBA,SX ;SZ STA T4 ;t4=sx-sz >>> ADDA,SX ;T2 STA T5 ;t5=sx+t2 >>> SUBA,SX ;T1 STA T6 ;t6=sx-t1 >>> ADDA,SX ;T1 STA T7 ;t7=sx+t1 >>> SUBA,T2 ;SX STA T8 ;t8=t2-sx >>> SUBA,SY ;SX STA T9 ;t9=sy-sx >>> ADDA,SX ;SY STA T10 ;t10=sx+sy * Et voila! *** Next, calculate A,B,C,...,I ** Another useful little macro DIV2 MAC ;Divide a signed number by 2 ;It is assumed that the number BPL POS ;is in the accumulator CLC EOR #$FF ;We need to un-negative the number ADC #01 ;by taking it's complement LSR ;divide by two CLC EOR #$FF ADC #01 ;Make it negative again JMP DONEDIV POS LSR ;Number is positive DONEDIV <<< MUL2 MAC ;Multiply a signed number by 2 BPL POSM CLC EOR #$FF ADC #$01 ASL CLC EOR #$FF ADC #$01 JMP DONEMUL POSM ASL DONEMUL <<< ** Note that we are currently making a minor leap ** of faith that no overflows will occur. :CALCA CLC LDX T1 LDA COS,X LDX T2 ADC COS,X STA A11 ;A=(cos(t1)+cos(t2))/2 :CALCB LDX T1 LDA SIN,X SEC LDX T2 SBC SIN,X STA B12 ;B=(sin(t1)-sin(t2))/2 :CALCC LDX SY LDA SIN,X >>> MUL2 STA C13 ;C=sin(sy) :CALCD SEC LDX T8 LDA COS,X LDX T7 SBC COS,X SEC LDX T5 SBC COS,X CLC LDX T6 ADC COS,X ;Di=(cos(t8)-cos(t7)+cos(t6)-cos(t5))/2 >>> DIV2 CLC LDX T3 ADC SIN,X SEC LDX T4 SBC SIN,X STA D21 ;D=(sin(t3)-sin(t4)+Di)/2 :CALCE SEC LDX T5 LDA SIN,X LDX T6 SBC SIN,X SEC LDX T7 SBC SIN,X SEC LDX T8 SBC SIN,X ;Ei=(sin(t5)-sin(t6)-sin(t7)-sin(t8))/2 >>> DIV2 CLC LDX T3 ADC COS,X CLC LDX T4 ADC COS,X STA E22 ;E=(cos(t3)+cos(t4)+Ei)/2 :CALCF LDX T9 LDA SIN,X SEC LDX T10 SBC SIN,X STA F23 ;F=(sin(t9)-sin(t10))/2 :CALCG LDX T6 LDA SIN,X SEC LDX T8 SBC SIN,X SEC LDX T7 SBC SIN,X SEC LDX T5 SBC SIN,X ;Gi=(sin(t6)-sin(t8)-sin(t7)-sin(t5))/2 >>> DIV2 CLC LDX T4 ADC COS,X SEC LDX T3 SBC COS,X STA G31 ;G=(cos(t4)-cos(t3)+Gi)/2 :CALCH CLC LDX T6 LDA COS,X LDX T7 ADC COS,X SEC LDX T5 SBC COS,X SEC LDX T8 SBC COS,X ;Hi=(cos(t6)+cos(t7)-cos(t5)-cos(t8))/2 >>> DIV2 CLC LDX T3 ADC SIN,X CLC LDX T4 ADC SIN,X STA H32 ;H=(sin(t3)+sin(t4)+Hi)/2 :WHEW CLC LDX T9 LDA COS,X LDX T10 ADC COS,X STA I33 ;I=(cos(t9)+cos(t10))/2 ** It's all downhill from here. JMP DOWNHILL TXT 'Gee Brain, what do you want to do ' TXT 'tonight?' ** Rotate, project, and store the points DOWNHILL * A neat macro NEG MAC ;Change the sign of a two's complement CLC LDA ]1 ;number. EOR #$FF ADC #$01 <<< *------------------------------- * These macros replace the previous projection * subroutine. SMULT MAC ;Multiply two signed 8-bit ;numbers: A*Y/64 -> A STA Z1 CLC EOR #$FF ADC #$01 STA Z2 LDA (Z1),Y SEC SBC (Z2),Y <<< ;All done :) ADDSUB MAC ;Add or subtract two numbers ;depending on first input IF -=]1 ;If subtract SEC ;then use this code SBC ]2 ELSE ;otherwise use this code CLC ADC ]2 FIN <<< PROJECT MAC ;The actual projection routine ;two inputs are used (x,y) ;corresponding to (+/-1,+/-1) ;The third input is used to ;determine if the rotated ;z-coordinate should be ;stored, and if so where. ;The calling routine handles ;changing the sign of z. LDA I33 ;Calculate rotated z: >>> ADDSUB,]1 ;G31 ;Add or subtract x >>> ADDSUB,]2 ;H32 ;Add or subtract y IF P,]3 ;Do we need to store the point? STA ]3 ;Then do so! FIN * EOR #128 ;We are going to take 128+z TAX ;Now it is ready for indexing LDA ZDIV,X ;Table of d/(z+z0) TAY ;Y now contains projection LDA C13 ;Now calculate rotated x >>> ADDSUB,]1 ;A11 >>> ADDSUB,]2 ;B12 >>> SMULT ;Signed multiply A*Y/64->A CLC ADC #64 ;Offset the coordinate TAX ;Now X is rotated x! LDA F23 ;Now it's y's turn >>> ADDSUB,]1 ;D21 >>> ADDSUB,]2 ;E22 >>> SMULT CLC ADC #64 ;Offset CMP YMIN ;Figure out if it is a BCS NOTMIN ;min or max value for y STA YMIN BCC NOTMAX ;This is used in calculating NOTMIN CMP YMAX ;the filled faces BCC NOTMAX STA YMAX NOTMAX TAY ;Not really necessary <<< ;All done LDA #64 ;Reset Ymin and Ymax STA YMIN STA YMAX * P1=[1 1 1] >>> PROJECT,1;1;P1Z ;Rotated z stored in P1Z STX P1X STY P1Y * P2=[1 -1 1] >>> PROJECT,1 ;-1;P2Z STX P2X STY P2Y * P3=[-1 -1 1] >>> PROJECT,-1;-1;NOPE ;Don't store z-value STX P3X STY P3Y * P4=[-1 1 1] >>> PROJECT,-1;1;P4Z STX P4X STY P4Y * P8=[-1 1 -1] >>> NEG,C13 STA C13 >>> NEG,F23 STA F23 >>> NEG,I33 STA I33 >>> PROJECT,-1;1;NOPE STX P8X STY P8Y * P7=[-1 -1 -1] >>> PROJECT,-1;-1;NOPE STX P7X STY P7Y * P6=[1 -1 -1] >>> PROJECT,1;-1;NOPE STX P6X STY P6Y * P5=[1 1 -1] >>> PROJECT,1;1;P5Z STX P5X STY P5Y * A little macro SETBUF MAC ;Put buffers where they can be hurt LDA #00 STA BUFFER LDA ZTEMP ;ztemp contains the high byte here STA BUFFER+1 <<< **** Clear buffer * >>> SETBUF *CLRBUF LDA #$00 ;Pretty straightforward, * LDX #$08 ;I think * LDY #$00 *:LOOP STA (BUFFER),Y * INY * BNE :LOOP * INC BUFFER+1 * DEX * BNE :LOOP * This is the new and improved buffer clear * routine for filled faces >>> SETBUF STA TEMP1+1 ;buffer2 will point to LDA #$80 ;buffer+128 STA TEMP1 ;Makes life faster for us FILCLR LDA #00 LDX #$08 ;We'll do it two at a time LDY #$00 :LOOP1 STA (BUFFER),Y STA (TEMP1),Y INY CPY YMIN BNE :LOOP1 LDA #$FF ;Now load with fills :LOOP2 STA (BUFFER),Y STA (TEMP1),Y INY CPY YMAX BCC :LOOP2 LDA #$00 ;Black out the rest :LOOP3 STA (BUFFER),Y STA (TEMP1),Y INY BPL :LOOP3 ;Until Y=128 LDY #00 INC BUFFER+1 INC TEMP1+1 DEX BNE :LOOP1 ;Go all the way around **** Now draw the lines. **** But first check for hidden faces! **** Remember: P1=[1 1 1] P2=[1 -1 1] P3=[-1 -1 1] **** P4=[-1 1 1] P5=[1 1 -1] P6=[1 -1 -1] P7=[-1 -1 -1] **** P8=[-1 1 -1] LINES LDA #00 STA FACES ;Hidden face counter :FACE1 LDA K SEC SBC P1Z BVS :FACE6 ;Overflow already? CLC ADC P5Z ;Is k-v1z < 0? ;If not, face is invisible BVC :DRAW1 ;But we might have overflow LDA P5Z ;Was overflow pos or neg? :DRAW1 BPL :FACE6 ;If pos then k-v1z > 0 LDA #$01 ;Otherwise, draw the STA FACES ;face! LDA P1X STA TX1 LDA P1Y STA TY1 LDA P2X STA TX2 LDA P2Y STA TY2 JSR DRAW ;P1-P2 LDA P3X STA TX1 LDA P3Y STA TY1 JSR DRAW ;P2-P3 LDA P4X STA TX2 LDA P4Y STA TY2 JSR DRAW ;P3-P4 LDA P1X STA TX1 LDA P1Y STA TY1 JSR DRAW ;P4-P1 Face 1 done. JMP :FACE2 ;If one is visible, the other ;isn't. :FACE6 LDA K SEC SBC P5Z BVS :FACE2 CLC ADC P1Z ;Now check if K-v6z < 0 BVC :DRAW6 ;Love that overflow LDA P1Z :DRAW6 BPL :FACE2 ;If not, go on LDA #$20 STA FACES ;Otherwise, draw it LDA P5X STA TX2 LDA P5Y STA TY2 LDA P6X STA TX1 LDA P6Y STA TY1 JSR DRAW ;P5-P6 LDA P7X STA TX2 LDA P7Y STA TY2 JSR DRAW ;P6-P7 LDA P8X STA TX1 LDA P8Y STA TY1 JSR DRAW ;P7-P8 LDA P5X STA TX2 LDA P5Y STA TY2 JSR DRAW ;P8-P5 :FACE2 LDA K SEC SBC P1Z BVS :FACE5 CLC ADC P4Z ;K-v2z < 0? BVC :DRAW2 LDA P4Z :DRAW2 BPL :FACE5 LDA #$02 ;If so, draw it! ORA FACES STA FACES LDX P1X ;We're doing this this way STX TX1 ;to save a few cycles LDX P1Y STX TY1 AND #$01 ;Shares an edge with face 1 BNE :F2S2 ;Skip to next edge if present LDA P2X STA TX2 LDA P2Y STA TY2 JSR DRAW ;P1-P2 :F2S2 LDX P5X STX TX2 LDX P5Y STX TY2 JSR DRAW ;P1-P5 LDX P6X STX TX1 LDX P6Y STX TY1 LDA FACES AND #$20 ;Also shares an edge with 6 BNE :F2S4 JSR DRAW ;P5-P6 :F2S4 LDA P2X STA TX2 LDA P2Y STA TY2 ;Such is face 2 JSR DRAW ;P6-P2 JMP :FACE3 ;Skip 5 :FACE5 LDA K SEC SBC P4Z BVS :FACE3 CLC ADC P1Z ;Same thing again... BVC :DRAW5 LDA P1Z :DRAW5 BPL :FACE3 LDA #$10 ORA FACES STA FACES LDX P3X STX TX1 LDX P3Y STX TY1 AND #$01 ;Shares with 1 BNE :F5S2 LDA P4X STA TX2 LDA P4Y STA TY2 JSR DRAW ;P3-P4 :F5S2 LDA P7X STA TX2 LDA P7Y STA TY2 JSR DRAW ;P3-P7 LDA P8X STA TX1 LDA P8Y STA TY1 LDA FACES AND #$20 ;Shares with 6 BNE :F5S4 JSR DRAW ;P7-P8 :F5S4 LDA P4X STA TX2 LDA P4Y STA TY2 ;P8-P4 JSR DRAW ;Two more to go! :FACE3 LDA K SEC SBC P1Z BVS :FACE4 CLC ADC P2Z BVC :DRAW3 LDA P2Z :DRAW3 BPL :FACE4 ;Ah reckon it's a'hidden, yup LDA #$04 ORA FACES STA FACES LDX P1X STX TX1 LDX P1Y STX TY1 AND #$01 ;Shares with 1 BNE :F3S2 LDA P4X STA TX2 LDA P4Y STA TY2 JSR DRAW ;P1-P4 :F3S2 LDX P5X STX TX2 LDX P5Y STX TY2 LDA FACES AND #$02 ;Shares with 2 BNE :F3S3 JSR DRAW ;P1-P5 :F3S3 LDX P8X STX TX1 LDX P8Y STX TY1 LDA FACES AND #$20 ;Shares with 6 BNE :F3S4 JSR DRAW ;P5-P8 :F3S4 LDX P4X STX TX2 LDX P4Y STX TY2 LDA FACES AND #$10 ;Shares with 5 BNE FACEDONE JSR DRAW ;P8-P4 JMP FACEDONE :FACE4 LDA K SEC SBC P2Z BVS FACEDONE CLC ADC P1Z BVC :DRAW4 LDA P1Z :DRAW4 BPL FACEDONE LDA P2X STA TX1 LDA P2Y STA TY1 LDA FACES AND #$01 ;Shares with 1 BNE :F4S2 LDA P3X STA TX2 LDA P3Y STA TY2 JSR DRAW ;P2-P3 :F4S2 LDA P6X STA TX2 LDA P6Y STA TY2 LDA FACES AND #$02 ;Shares with 2 BNE :F4S3 JSR DRAW ;P2-P6 :F4S3 LDA P7X STA TX1 LDA P7Y STA TY1 LDA FACES AND #$20 ;Shares with 6 BNE :F4S4 JSR DRAW ;P6-P7 :F4S4 LDA P3X STA TX2 LDA P3Y STA TY2 LDA FACES AND #$10 ;Shares with 5 BNE FACEDONE JSR DRAW ;P7-P3 FACEDONE ;Whew! Time for a beer. **** Now we need to unfill the outside from the faces UNFILL LDY YMIN :LOOP >>> SETBUF LDX #08 :L1 LDA (BUFFER),Y EOR #$FF ;Go till we find a plotted BNE :GOTCHA ;point (i.e. A <> $FF) * LDA #00 ;Unfilling as we go... STA (BUFFER),Y LDA #$80 STA BUFFER LDA (BUFFER),Y EOR #$FF BNE :GOTCHA * LDA #00 STA (BUFFER),Y STA BUFFER INC BUFFER+1 DEX ;This is our safety valve BNE :L1 ;Really shouldn't need it JSR CHOKE JMP SWAPBUF :GOTCHA ;A contains the EOR plot value STA TEMP1 ;Now find the high bit LDA #00 :L2 SEC ROL LSR TEMP1 ;Should really use a table BNE :L2 ;for this! AND (BUFFER),Y STA (BUFFER),Y LDA ZTEMP ;Now go to the end ;Carry is clear ;Actually we add 7 ADC #$06 ;16 columns of 128 bytes STA BUFFER+1 LDA #$80 STA BUFFER :LOOP2 LDA (BUFFER),Y ;And work backwards! EOR #$FF BNE :GOTCHA2 STA (BUFFER),Y STA BUFFER ;Stick a zero into buffer LDA (BUFFER),Y EOR #$FF BNE :GOTCHA2 STA (BUFFER),Y LDA #$80 STA BUFFER DEC BUFFER+1 BNE :LOOP2 :GOTCHA2 STA TEMP1 ;Again find the high bit LDA #00 :L3 SEC ROR ASL TEMP1 BNE :L3 AND (BUFFER),Y STA (BUFFER),Y INY ;Now keep going CPY YMAX BCC :LOOP ;Until we hit ymax! BEQ :LOOP ;We need the last one too. **** Swap buffers SWAPBUF LDA VMCSB EOR #$02 ;Pretty tricky, eh? STA VMCSB LDA #$08 EOR ZTEMP ;ztemp=high byte just flips STA ZTEMP ;between $30 and $38 JMP MAIN ;Around and around we go... TXT 'Same thing we do every night, Pinky: ' TXT 'try to take over the world!' *------------------------------- * General questionable-value error procedure CHOKE LDX #00 :LOOP LDA :CTEXT,X BEQ :DONE JSR CHROUT INX JMP :LOOP :DONE RTS :CTEXT HEX 0D ;CR TXT 'something choked :(' HEX 0D00 TXT 'Narf!' *------------------------------- * Drawin' a line. A fahn lahn. *** Some useful macros PLOTPX MAC ;plot a point in x PHA ;Use this one every time LDA BITP,X ;X is increased BMI C1 LDA #$80 ;Table has been rearranged EOR BUFFER ;for filling faces STA BUFFER BMI C2 INC BUFFER+1 C2 LDA #%01111111 ;Note that this is changed C1 AND (BUFFER),Y ;for plotting filled faces STA (BUFFER),Y PLA ;Need to save A! <<< PLOTPY MAC ;Plot a point in y: simpler and necessary! PHA ;Use this one when you just increase Y LDA BITP,X ;but X doesn't change AND (BUFFER),Y STA (BUFFER),Y PLA <<< CINIT MAC ;Macro to initialize the counter LDA ]1 ;dx or dy LSR EOR #$FF ;(Not really two's complement) ADC #$01 ;A = 256-dx/2 or 256-dy/2 <<< ;The dx/2 makes a nicer looking line XSTEP MAC ;Macro to take a step in X XLOOP INX ADC DY BCC L1 * Do we use INY or DEY here? IF I,]1 ;If the first character is an 'I' INY ELSE DEY FIN SBC DX L1 >>> PLOTPX ;Always take a step in X CPX X2 BNE XLOOP <<< YSTEP MAC ;Same thing, but for Y YLOOP IF I,]1 INY ELSE DEY CLC ;Very important! FIN ADC DX BCC L2 INX ;Always increase X SBC DY >>> PLOTPX JMP L3 L2 >>> PLOTPY ;We only increased Y L3 CPY Y2 BNE YLOOP <<< **** Initial line setup DRAW >>> MOVE,TX1 ;X1 ;Move stuff into zero page >>> MOVE,TX2 ;X2 ;Where it can be modified >>> MOVE,TY1 ;Y1 >>> MOVE,TY2 ;Y2 >>> SETBUF ;Now we can clobber the buffer SEC ;Make sure x1y1? EOR #$FF ;Otherwise dy=y1-y2 ADC #$01 :CONT2 STA DY CMP DX ;Who's bigger: dy or dx? BCS STEPINY ;If dy, we need to take big steps in y STEPINX LDY Y1 ;X is already set to x1 LDA BITP,X ;Plot the first point AND (BUFFER),Y STA (BUFFER),Y >>> CINIT,DX ;Initialize the counter CPY Y2 BCS XDECY ;Do we step forwards or backwards in Y? XINCY >>> XSTEP,INY RTS STEPINY LDY Y1 ;Well, a little repetition never hurt anyone LDA BITP,X AND (BUFFER),Y STA (BUFFER),Y >>> CINIT,DY CPY Y2 BCS YDECY YINCY >>> YSTEP,INY RTS XDECY >>> XSTEP,DEY ;This is put here so that RTS ;Branches are legal YDECY >>> YSTEP,DEY RTS *------------------------------- * Clean up CLEANUP LDA VMCSB ;Switch char rom back in AND #%11110101 ;default STA VMCSB RTS ;bye! TXT 'Happy Holidays! ' TXT 'slj 12/94' *------------------------------- * Set up bit table DS ^ ;Clear to end of page ;So that tables start on a page boundary BITP LUP 16 ;128 Entries for X DFB %01111111 DFB %10111111 DFB %11011111 DFB %11101111 DFB %11110111 DFB %11111011 DFB %11111101 DFB %11111110 --^ SIN ;Table of sines, 120 bytes COS EQU SIN+128 ;Table of cosines ;Both of these trig tables are ;currently set up from BASIC ZDIV EQU COS+128 ;Division table TMATH EQU ZDIV+384 ;Math table of f(x)=x*x/256 And here are the native C64 files: begin 600 cube3d2.0.lnx.uu M`0A;"`H`ES4S,C@P+#`ZES4S,C@Q+#`ZES8T-BS"*#$V,BDZF2*3$1$1$1$1 M$1$B.IDB("`@("!54T4@3%E.6"!43R!$25-33TQ612!42$E3($9)3$4B.HDQ M,`````T@,B`@*DQ93E@@6$E)($)9(%=)3$P@0T]23$59#2`U(`U#54)%,T0R M+C`N3Z"@H*"@#2`Q,R`-4`T@,34U(`U#54)%,T0R+C`N4Z"@H*"@#2`X-B`- M4`T@,C$X(`U#54)%,T0R+C$N3Z"@H*"@#2`Q,R`-4`T@,34U(`U)3DE4,T0R M+C"@H*"@H*"@#2`Q,"`-4`T@-3`@#4Y/5$53,BXPH*"@H*"@H*`-(#0@#5`- M(#$Y,R`-```````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M``````````````````"`J0"-(-"-(="M&-`I#PD0C1C0H`"I'X7[J8"%_$Q9 M@9,%$1$1("`@("`@("`@("`@($-50D4S1"!6,BXP#0T@("`@("`@("`@("`@ M("`@("!"60V?("`@(%-415!(14X@2E5$1)D@("`@1T5/4D=%(%1!64Q/4@T- MFR`@0TA%0TL@3U54(%1(12!*04XN(#DU($E34U5%($]b@($,]2$%#2TE. M1YL@1D]2($U/4D4@1$5404E,4R$-#1T=GA)&,2]&,I(@+2!)3D,O1$5#(%@M M4D]4051)3TX-'1T21C,O1C22("T@24Y#+T1%0R!9+5)/5$%424].#1T=$D8U M+T8VDB`M($E.0R]$14,@6BU23U1!5$E/3@T='1)&-Y(@4D531513#2`@4%)% M4U,@42!43R!154E4#0T%("`@("`@4%)%4U,@04Y9($M%62!43R!"14=)3@T` ML?OP*2#2_\C0]N;\3%F!=$A)4R!)4R!!(%-%0U)%5"!415A4($U%4U-!1T4A M(.3_R0#P^:F/A2.%):D!C2'0J9,@TO^I`(TAT*E`:0R%^ZD%A?RI`*``H@`8 MD?O(:1"0^1BE^VDHA?NE_&D`A?R@`.B*X!#0Y*D`A:.I,(6DA0*M&-`I\0D. MC1C0J0"%885BA6.%9(5EA698(.3_R870"Z5AR3SP6.9A3%>"R8G0":5A\$O& M84Q7@LF&T`NE8LD\\#SF8DQ7@LF*T`FE8O`OQF),5X+)A]`+I6/)//`@YF-, M5X+)B]`)I6/P$\9C3%>"R8C0`TSC@)`"Z7B%9!BE M965BR7B0`NEXA648I69E8\EXD`+I>(5F.*5EY6:P`FEXA6<8I65E9LEXD`+I M>(5H&*5D96;)>)`"Z7B%:3BE9.5FL`)I>(5J&*5D96C)>)`"Z7B%:SBE9.5G ML`)I>(5L&*5D96?)>)`"Z7B%;3BE:.5DL`)I>(5N.*5EY62P`FEXA6\8I61E M9(5P&*9GO0"-IFA]`(V%I:9GO8",.*9H_8",A::F9;V`C!`.&$G_ M:0$*&$G_:0%,)X,*A:%^*6M&&6K&&6L MA5>JO8"-J*6G&&6E&&6FA2(82?]I`84DL2(X\208:4"JI:H89:@89:F%(AA) M_VD!A22Q(CCQ)!AI0,7WL`2%]Y`&Q?B0`H7XJ(:2A).EK1AEJSCEK(58JKV` MC:BEIQAEI3CEIH4B&$G_:0&%)+$B./$D&&E`JJ6J&&6H..6IA2(82?]I`84D ML2(X\208:4#%][`$A?>0!L7XD`*%^*B&E(25I:TXY:LXY:RJO8"-J*6G..6E M..6FA2(82?]I`84DL2(X\208:4"JI:HXY:@XY:F%(AA)_VD!A22Q(CCQ)!AI M0,7WL`2%]Y`&Q?B0`H7XJ(:6A*ZEK3CEJQAEK(59JKV`C:BEISCEI1AEIH4B M&$G_:0&%)+$B./$D&&E`JJ6J..6H&&6IA2(82?]I`84DL2(X\208:4#%][`$ MA?>0!L7XD`*%^*B&KX2P&*6G2?]I`86G&*6J2?]I`86J&*6M2?]I`86MI:TX MY:L89:RJO8"-J*6G..6E&&6FA2(82?]I`84DL2(X\208:4"JI:HXY:@89:F% M(AA)_VD!A22Q(CCQ)!AI0,7WL`2%]Y`&Q?B0`H7XJ(91A%*EK3CEJSCEK*J] M@(VHI:P!(7WD`;%^)`"A?BHAG&$4*6M&&6K..6LJKV`C:BEIQAE MI3CEIH4B&$G_:0&%)+$B./$D&&E`JJ6J&&6H..6IA2(82?]I`84DL2(X\208 M:4#%][`$A?>0!L7XD`*%^*B&LX2TI:T89:L89:R%8*J]@(VHI:<89:489::% M(AA)_VD!A22Q(CCQ)!AI0*JEJAAEJ!AEJ84B&$G_:0&%)+$B./$D&&E`Q?>P M!(7WD`;%^)`"A?BHAK&$LJD`A:.E`H6DA?RI@(7[J0"B"*``D:.1^\C$]]#W MJ?^1HY'[R,3XD/>I`)&CD?O($/F@`.:DYOS*T-JI`(6UI;8XY5=P1!AE8%`" MI6`0.ZD!A;6EDH4_I9.%0*64A4&EE85"(#.*I9:%/Z6NA4`@,XJEKX5!I;"% M0B`SBJ62A3^EDX5`(#.*3-J'I;8XY6!P01AE5U`"I5<0.*D@A;6EL85!I;*% M0J6SA3^EM(5`(#.*I7&%0:50A4(@,XJE484_I5*%0"`SBJ6QA4&ELH5"(#.* MI;8XY5=P4!AE65`"I5D01ZD"!;6%M::2AC^FDX9`*0'0"Z64A4&EE85"(#.* MIK&&0::RAD(@,XJFLX8_IK2&0*6U*2#0`R`SBJ64A4&EE85"(#.*3(6(I;8X MY5EP31AE5U`"I5<01*D0!;6%M::6AC^FKH9`*0'0"Z6OA4&EL(5"(#.*I7&% M0:50A4(@,XJE484_I5*%0*6U*2#0`R`SBJ6OA4&EL(5"(#.*I;8XY5=P7!AE M6%`"I5@04ZD$!;6%M::2AC^FDX9`*0'0"Z6OA4&EL(5"(#.*IK&&0::RAD*E MM2D"T`,@,XJF488_IE*&0*6U*2#0`R`SBJ:OAD&FL(9"I;4I$-!B(#.*3$2) MI;8XY5AP51AE5U`"I5<03*64A3^EE85`I;4I`=`+I9:%0:6NA4(@,XJELX5! MI;2%0J6U*0+0`R`SBJ5QA3^E4(5`I;4I(-`#(#.*I9:%0:6NA4*EM2D0T`,@ M,XJD]ZD`A:.E`H6DH@BQHTG_T!N1HZF`A:.QHTG_T`^1HX6CYJ3*T.4@"8I, MN(F%^ZD`."I&^]#Z,:.1HZ4":0:%I*F`A:.QHTG_T!21HX6CL:-)_]`*D:.I M@(6CQJ30YH7[J0`X:@;[T/HQHY&CR,3XD)#PCJT8T$D"C1C0J0A%`H4"3/&! M7[ ML!.E_J3\A?R$_J7[I/V$^X7]..7[A?FF^Z7[2DI*2I`%H("$HQAEI(6D.*7^ MY?RP!$G_:0&%^L7YL#BD_+T`C#&CD:.E^4I)_VD!Q/ZP:.AE^I`#R.7Y2+T` MC#`,J8!%HX6C,`+FI*E_,:.1HVCD_=#=8*3\O0",,:.1HZ7Z2DG_:0'$_K!4 MR&7YD!WHY?I(O0",,`RI@$6CA:,P`N:DJ7\QHY&C:$P"BTB]`(PQHY&C:,3^ MT-%@Z&7ZD`.(Y?E(O0",,`RI@$6CA:,P`N:DJ7\QHY&C:.3]T-U@B!AE^9`= MZ.7Z2+T`C#`,J8!%HX6C,`+FI*E_,:.1HVA,5XM(O0",,:.1HVC$_M#08*T8 MT"GUC1C08&A!4%!9(&A/3$E$05E3(2!33$H@,3(O.30````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M````````````````````````````````````?[_?[_?[_?Y_O]_O]_O]_G^_ MW^_W^_W^?[_?[_?[_?Y_O]_O]_O]_G^_W^_W^_W^?[_?[_?[_?Y_O]_O]_O] M_G^_W^_W^_W^?[_?[_?[_?Y_O]_O]_O]_G^_W^_W^_W^?[_?[_?[_?Y_O]_O M]_O]_G^_W^_W^_W^?[_?[_?[_?X!A?K%^;`XI/R]`(PQHY&CI?E*2?]I`<3^ ML&CH9?J0`\CE^4B]`(PP#*F`1:.%HS`"YJ2I?S&CD:-HY/W0W6"D_+T`C#&C MD:.E^DI)_VD!Q/ZP5,AE^9`=Z.7Z2+T`C#`,J8!%`'`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`Y-:!)4U-512Z@H*"@*@TJH&9/4J!$151!24Q3H$].H%1(25.@4%)/1U)! M32R@*@TJH%)%042@5$A%H$%25$E#3$4AH*"@H*"@H*"@H*"@*@TJH*"@H*"@ MH*"@H*"@H*"@H*"@H*"@H*"@H*"@H*"@*@TJH'=2251%H%1/H%53(:"@H*"@ MH*"@H*"@H*"@H*"@*@TJH*"@H*"@H*"@H*"@H*"@H*"@H*"@H*"@H*"@H*"@ M*@TJH&U94T5,1J!72$5.H%E/54Y'H$1)1*"@H*"@H*"@*@TJH$5!1T523%F@ M1E)%455%3E2@H*"@H*"@H*"@H*"@*@TJH&1/0U1/4J!!3D2@@0UE-0D%,+J"@H*"@H*"@H*"@ M*@TJH*"@H"V@,:!C3U))3E1(24%.4Z`Q,Z"@H*"@H*"@*@TJH*"@H*"@H*"@ MH*"@H*"@H*"@H*"@H*"@H*"@H*"@*@TJH'`N#$@97%U("1F8B`[<$])3E13H$9/4J!$4D%724Y'H$&@3$E.10UY M,2!E<74@)&9C(#MT2$531:!:15)/H%!!1T6@041$4D534T53#7@R(&5Q=2`D M9F0@.T1/3B=4H$-/3D9,24-4H%=)5$B@8F%S:6,->3(@97%U("1F90UD>"!E M<74@)&8Y#61Y(&5Q=2`D9F$-=&5M<#$@97%U("1F8B`[;T:@0T]54E-%+*!# M3U5,1*!#3TY&3$E#5*!7251(H%@Q#71E;7`R(&5Q=2`D9F,@.W1%35!/4D%2 M6:!605))04),15,->G1E;7`@97%U("0P,B`[=5-%1*!&3U*@0E5&1D52H%-7 M05`NH*!D3TXG5*!43U5#2"X->C$@97%U("0R,B`[=5-%1*!"6:!-051(H%)/ M551)3D4->C(@97%U("0R-"`[9$].)U2@5$]50TB@5$A%4T6@14E42$52(0UK M(&5Q=2`D8C8@.V-/3E-404Y4H%53142@1D]2H$A)1$1%3@T@("`[4U521D%# M1:!$151%0U1)3TZ@+:!$3TXG5*!43U5#2`UF86-E6UI;B!E<74@)&8W(#MU4T5$H$E.H$9) M3$Q%1*!&04-%4Z`M+:!!4PUY;6%X(&5Q=2`D9C@@.U5354%,+*!$3TXG5*!4 M3U5#2`UA;F=M87@@97%U(#$R,"`[=$A%4D6@05)%H#(J4$DO04Y'34%8H$%. M1TQ%4PT-*J!V:6,-#79M8W-B(&5Q=2`D9#`Q.`UB:V=N9"!E<74@)&0P,C`- M8F]R9&5R(&5Q=2`D9#`R,0US#(@/2`D-#$-='DR(#T@)#0R#7`Q>"`]("0Y,B`[ M=$A%4T6@05)%H%1%35!/4D%26:!35$]204=%#7`Q>2`]("0Y,R`[=5-%1*!) M3J!03$]45$E.1Z!42$6@4%)/2D5#5$E/3@UP,G@@/2`D.30-<#)Y(#T@)#DU M(#MT2$59H$%21:!(15)%H%-/H%1(052@5T4-<#-X(#T@)#DV(#M$3TXG5*!( M059%H%1/H%)%0T%,0U5,051%H%1(14TN#7`S>2`]("1A90UP-'@@/2`D868@ M.W1(15F@34%+1:!,249%H$5!4UDN#7`T>2`]("1B,`UP-7@@/2`D8C$@.W=( M6:!!4D6@64]5H$Q/3TM)3D>@052@346@3$E+1:!42$%4/PUP-7D@/2`D8C(@ M.V1/3B=4H%E/5:!44E535*!-13\-<#9X(#T@)&(S#7`V>2`]("1B-"`[:$%6 M24Y'H$%.3U1(15*@0TA)3$2@5T%33B=4H$U9H$E$14$N#7`W>"`]("0W,0UP M-WD@/2`D-3`-<#AX(#T@)#4Q#7`X>2`]("0U,@UP,7H@/2`D-3<@.W1(15-% MH$%21:!:+4-/3U)$24Y!5$53#7`R>B`]("0U."`[=T6@3TY,6:!.145$H%1( M15-%H$9/55*@5$^@0TA%0TL-<#1Z(#T@)#4Y(#M&3U*@2$E$1$5.H$9!0T53 M#7`U>B`]("0V,`UD*!)4Z!42$6@24Y#4D5-14Y4H$9/ M4@T@("`[4D]4051)3D>@05)/54Y$H%@-9'-Y(#T@)#8R(#MS24U)3$%2H$9/ M4J!D@UD'EZ#6,Q,R`]("1A-PUD,C$@/2`D83@@.W1(1:!.54U"15*@1$5.3U1%4Z`H M4D]7+$-/3%5-3BD-93(R(#T@)&$Y#68R,R`]("1A80UG,S$@/2`D86(-:#,R M(#T@)&%C#6DS,R`]("1A9`T-#2HJ*J!M04-23U,-#6UO=F4@;6%C#2!L9&$@ M73$-('-T82!=,@T@/#P\#0UG971K97D@;6%C("`[=T%)5*!&3U*@0:!+15E0 M4D534PUW86ET(&IS2`C,#`- M(&QD82`C/'1T97AT#2!S=&$@=&5M<#$-(&QD82`C/G1T97AT#2!S=&$@=&5M M<#(-(&IM<"!T:71L90UT=&5X="!H97@@.3,P-3$Q,3$Q,2`[0TQ%05*@4T-2 M145.+*!72$E412R@0U)34J!$3@T@='AT(">@H*"@H*"@H*"@H*"@0U5"13-$ MH%8R+C`G+#!$+#!$#2!T>'0@)Z"@H*"@H*"@H*"@H*"@H*"@H$)9)RPP1`T@ M:&5X(#EF(#M#64%.#2!T>'0@)Z"@H*!35$502$5.H$I51$0G#2!H97@@.3D- M('1X="`GH*"@H$=%3U)'1:!405E,3U(G+#!$+#!$#2!H97@@.6(-('1X="`G MH*!#2$5#2Z!/552@5$A%H$I!3BZ@.36@25-3546@3T8G+#!$#2!H97@@.38- M('1X="`GH*!#/4A!0TM)3D"`Q9#%D,3(-('1X M="`G1C,O1C0G+#DR#2!T>'0@)Z`MH$E.0R]$14.@62U23U1!5$E/3B"`Q9#%D,3(-('1X="`G1C4O1C8G+#DR#2!T>'0@)Z`MH$E.0R]$14.@ M6BU23U1!5$E/3B"`Q9#%D,3(-('1X="`G1C'0@ M)Z!215-%5%,G+#!$#2!T>'0@)Z"@4%)%4U.@4:!43Z!154E4)RPP1`T@:&5X M(#!D,#4-('1X="`GH*"@H*"@4%)%4U.@04Y9H$M%6:!43Z!"14=)3B"`P,`UT:71L92!L9&$@*'1E;7`Q*2QY#2!B97$@.F-O;G0-(&IS0T@8FYE('1I=&QE#2!I;F,@=&5M<#(-(&IM<"!T:71L90T@ M='AT("=T2$E3H$E3H$&@4T5#4D54H%1%6%2@34534T%'12$G#3IC;VYT(#X^ M/B!G971K97D-#2HJ*BJ@0T@:6YY#2!A M9&,@(S$V#2!B8V,@.FQO;W`-(&-L8PT@;&1A('1E;7`Q#2!A9&,@(S0P(#MN M145$H%1/H$%$1*`T,*!43Z!42$6@0D%31:!03TE.5$52#2!S=&$@=&5M<#$@ M.W1/H$I535"@5$^@5$A%H$Y%6%2@4D]7#2!L9&$@=&5M<#$K,0T@861C(",P M,"`[=$%+1:!#05)%H$]&H$-!4E))15,-('-T82!T96UP,2LQ#2!L9'D@(S`P M#2!I;G@-('1X82`@.WB@25.@04Q33Z!!3J!)3D1%6*!)3E1/H%1(1:!#2$%2 M04-415*@3E5-0D52#2!C<'@@(S$V#2!B;F4@.FQO;W`@.VY%142@5$^@1$^@ M252@,3:@5$E-15,-#2`^/CX@9&5B=6`T@0T@@T@@T-(#X^/B!D96)U9RPG-"<- M#2HM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM#2J@;4%)3J!,3T]0 M#0TJ*BHJH&=%5*!+15E04D534PT-;6%I;@T@8VQI#6MP2`[:4Y#4D5! M4T6@62U23U1!5$E/3@T@:FUP(#IC;VYT#3IF-"!C;7`@(S$S.`T@8FYE(#IF M-0T@;&1A(&1S>0T@8F5Q(#IC;VYT#2!D96,@9'-Y#2!J;7`@.F-O;G0-.F8U M(&-M<"`C,3,U#2!B;F4@.F8V#2!L9&$@9'-Z#2!C;7`@(V%N9VUA>"\R#2!B M97$@.F-O;G0-(&EN8R!D@T@:FUP(#IC;VYT#3IF-R!C;7`@(S$S-@T@8FYE(#IQ#2!J;7`@:6YI=`TZ M<2!C;7`@(R=1)R`[4:!154E44PT@8FYE(#IC;VYT#2!J;7`@8VQE86YU<`T- M.F-O;G0@`T@8VQC#2!L9&$@"`[`T@8F-C M(#IC;VYT,PT@@T-*BHJ*J!R3U1! M5$6@0T]/4D1)3D%415,-#7)O=&%T90T-*BHJH&9)4E-4+*!#04Q#54Q!5$6@ M5#$L5#(L+BXN+%0Q,`T-*BJ@=%=/H$U!0U)/4Z!43Z!324U03$E&6:!/55*@ M3$E&10UA9&1A(&UA8R`@.V%$1*!45T^@04Y'3$53H%1/1T542$52#2!C;&,- M(&QD82!=,0T@861C(%TR#2!C;7`@(V%N9VUA>"`[:5.@5$A%H%-53:`^H#(J M4$D_#2!B8V,@9&]N90T@"`[ M;T]04RR@5T6@3D5%1*!43Z!!1$2@,BI020UD;VYE(#P\/`T-*BJ@;D]7H$-! M3$-53$%41:!4,2Q4,BQ%5$,N#0T@/CX^('-U8F$L#MS>@T@#MT,0T@3MS>`T@@250G4Z!#3TU03$5-14Y4#2!L M@0:!-24Y/4J!,14%0#2HJ MH$]&H$9!251(H%1(052@3D^@3U9%4D9,3U=3H%=)3$R@3T-#55(N#0TZ8V%L M8V$@8VQC#2!L9'@@=#$-(&QD82!C;W,L>`T@;&1X('0R#2!A9&,@8V]S+'@- M('-T82!A,3$@.V$]*$-/4RA4,2DK0T]3*%0R*2DO,@TZ8V%L8V(@;&1X('0Q M#2!L9&$@"!T-PT@"!T-0T@"!T-@T@861C(&-O`T@;&1X('0V#2!S8F,@`T@8VQC#2!L9'@@=#0-(&%D M8R!C;W,L>`T@`T@"!T-@T@;&1A('-I;BQX#2!S96,-(&QD>"!T.`T@"!T-PT@"!T-0T@"!T-PT@861C(&-O"!T-0T@ M"!T.`T@"!T.0T@;&1A(&-OC(I+'D-(#P\/"`@.V%,3*!$3TY%H#HI#0T- M861D@5$^@5$%+1:`Q M,C@K6@T@=&%X("`[;D]7H$E4H$E3H%)%0419H$9/4J!)3D1%6$E.1PT@;&1A M('ID:78L>"`[=$%"3$6@3T:@1"\H6BM:,"D-('1A>2`@.WF@3D]7H$-/3E1! M24Y3H%!23TI%0U1)3TX-#2!L9&$@8S$S(#MN3U>@0T%,0U5,051%H%)/5$%4 M142@6`T@/CX^(&%D9'-U8BQ=,3MA,3$-(#X^/B!A9&1S=6(L73([8C$R#2`^ M/CX@@>*!)4Z!2 M3U1!5$5$H%@A#0T@;&1A(&8R,R`[;D]7H$E4)U.@62=3H%154DX-(#X^/B!A M9&1S=6(L73$[9#(Q#2`^/CX@861D"!T87D@(#MN3U2@4D5!3$Q9H$Y%0T53 M4T%260T-(#P\/"`@.V%,3*!$3TY%#0T-(&QD82`C-C0@.W)%4T54H'E-24Z@ M04Y$H'E-05@-('-T82!Y;6EN#2!S=&$@>6UA>`T-*J!P,3U;,:`QH#%=#2`^ M/CX@<')O:F5C="PQ.S$[<#%Z(#MR3U1!5$5$H%J@4U1/4D5$H$E.H'`Q>@T@ M`T@0TJH'`R/5LQH"TQH#%=#2`^/CX@<')O:F5C="PQ M.RTQ.W`R>@T@`T@0TJH'`S/5LM,:`M,:`Q70T@/CX^ M('!R;VIE8W0L+3$[+3$[;F]P92`[9$].)U2@4U1/4D6@6BU604Q510T@`T@0TJH'`T/5LM,:`QH#%=#2`^/CX@<')O:F5C="PM,3LQ M.W`T>@T@`T@0TJH'`X/5LM,:`QH"TQ70T@/CX^(&YE M9RQC,3,-('-T82!C,3,-(#X^/B!N96`T@0TJH'`V/5LQH"TQH"TQ70T@/CX^('!R M;VIE8W0L,3LM,3MN;W!E#2!S='@@<#9X#2!S='D@<#9Y#2J@<#4]6S&@,:`M M,5T-(#X^/B!P"!P-7@-('-T>2!P-7D-#2J@ M8:!,25143$6@34%#4D\-#7-E=&)U9B!M86,@(#MP552@0E5&1D524Z!72$52 M1:!42$59H$-!3J!"1:!(55)4#2!L9&$@(S`P#2!S=&$@8G5F9F5R#2!L9&$@ M>G1E;7`@.UI414U0H$-/3E1!24Y3H%1(1:!(24=(H$)95$6@2$5210T@:`C)#`P#2HZ;&]O<*!S=&&@*&)U M9F9E0TJH&EN>0TJH&)N9:`Z;&]O<`TJH&EN8Z!B=69F97(K,0TJH&1E M>`TJH&)N9:`Z;&]O<`T-*J!T2$E3H$E3H%1(1:!.15>@04Y$H$E-4%)/5D5$ MH$)51D9%4J!#3$5!4@TJH%)/551)3D6@1D]2H$9)3$Q%1*!&04-%4PT-(#X^ M/B!S971B=68-('-T82!T96UP,2LQ(#M"549&15(RH%=)3$R@4$])3E2@5$\- M(&QD82`C)#@P(#M"549&15(K,3(X#2!S=&$@=&5M<#$@.VU!2T53H$Q)1D6@ M1D%35$52H$9/4J!54PUF:6QC;'(@;&1A(",P,`T@;&1X(",D,#@@.W=%)TQ, MH$1/H$E4H%173Z!!5*!!H%1)344-(&QD>2`C)#`P#3IL;V]P,2!S=&$@*&)U M9F9E0T@0T@:6YY#2!C<'D@>6UI;@T@8FYE(#IL M;V]P,0T@;&1A(",D9F8@.VY/5Z!,3T%$H%=)5$B@1DE,3%,-.FQO;W`R('-T M82`H8G5F9F5R*2QY#2!S=&$@*'1E;7`Q*2QY#2!I;GD-(&-P>2!Y;6%X#2!B M8V,@.FQO;W`R#2!L9&$@(R0P,"`[8DQ!0TN@3U54H%1(1:!215-4#3IL;V]P M,R!S=&$@*&)U9F9E0T@0T@:6YY#2!B<&P@.FQO M;W`S(#MU3E1)3*!Y/3$R.`T@;&1Y(",P,`T@:6YC(&)U9F9E@5$A%H$Q)3D53+@TJ*BHJH&)55*!&25)35*!# M2$5#2Z!&3U*@2$E$1$5.H$9!0T53(0TJ*BHJH')%345-0D52.J!P,3U;,:`Q MH#%=H'`R/5LQH"TQH#%=H'`S/5LM,:`M,:`Q70TJ*BHJH'`T/5LM,:`QH#%= MH'`U/5LQH#&@+3%=H'`V/5LQH"TQH"TQ7:!P-SU;+3&@+3&@+3%=#2HJ*BJ@ M<#@]6RTQH#&@+3%=#0UL:6YEB`[ M=T%3H$]615)&3$]7H%!/4Z!/4J!.14<_#3ID#$- M(&QD82!P,7D-('-T82!T>3$-(&QD82!P,G@-('-T82!T>#(-(&QD82!P,GD- M('-T82!T>3(-(&IS#$- M(&QD82!P,WD-('-T82!T>3$-(&IS#(-(&QD82!P-'D-('-T82!T>3(-(&IS#$-(&QD82!P,7D-('-T82!T>3$-(&ISB`[;D]7H$-( M14-+H$E&H&LM5C9:H#R@,`T@8G9C(#ID`T@0T@`T@ M0T@`T@0T@`T@0T@`T@0T@ M@T@8G9S(#IF86-E-0T@8VQC#2!A9&,@<#1Z(#MK+58R6J`\H#`_ M#2!B=F,@.F1R87@250A#2!O"!P,7@@.W=%)U)%H$1/24Y'H%1(25.@5$A)4Z!705D-('-T>"!T>#$@ M.U1/H%-!5D6@0:!&15>@0UE#3$53#2!L9'@@<#%Y#2!S='@@='DQ#0T@86YD M(",D,#$@.W-(05)%4Z!!3J!%1$=%H%=)5$B@1D%#1:`Q#2!B;F4@.F8R"!P-7@-('-T>"!T>#(-(&QD>"!P-7D-('-T>"!T>3(-(&IS"!P-G@-('-T>"!T>#$-(&QD>"!P-GD-('-T>"!T>3$- M#2!L9&$@9F%C97,-(&%N9"`C)#(P(#MA3%-/H%-(05)%4Z!!3J!%1$=%H%=) M5$B@-@T@8FYE(#IF,G,T#0T@:G-R(&1R87<@.W`U+7`V#0TZ9C)S-"!L9&$@ M<#)X#2!S=&$@='@R#2!L9&$@<#)Y#2!S=&$@='DR(#MS54-(H$E3H$9!0T6@ M,@T@:G-R(&1R87<@.W`V+7`R#2!J;7`@.F9A8V4S(#MS2TE0H#4-#3IF86-E M-2!L9&$@:PT@@04=!24XN+BX-(&)V8R`Z9')A=S4-(&QD82!P,7H- M.F1R87"!P,W@-('-T>"!T>#$-(&QD>"!P,WD-('-T>"!T>3$-#2!A M;F0@(R0P,2`[`T@ M0T@#(-(&QD82!P-'D-('-T82!T>3(@.W`X+7`T#2!J@T@8G9S(#IF M86-E-`T@8VQC#2!A9&,@<#)Z#2!B=F,@.F1R87#(-(&QD82!P-'D-('-T M82!T>3(-(&IS`T@0T@"!P-'@-('-T>"!T>#(-(&QD>"!P-'D- M('-T>"!T>3(-#2!L9&$@9F%C97,-(&%N9"`C)#$P(#MS2$%215.@5TE42*`U M#2!B;F4@9F%C961O;F4-#2!J`T@0T@#$-(&QD82!P-WD-('-T82!T>3$-#2!L9&$@9F%C97,-(&%N9"`C M)#(P(#MS2$%215.@5TE42*`V#2!B;F4@.F8T`T@0T@@5T6@3D5%1*!43Z!53D9)3$R@5$A% MH$]55%-)1$6@1E)/3:!42$6@1D%#15,-=6YF:6QL(&QD>2!Y;6EN#3IL;V]P M(#X^/B!S971B=68-(&QD>"`C,#@-.FPQ(&QD82`H8G5F9F5R*2QY#2!E;W(@ M(R1F9B`[9T^@5$E,3*!71:!&24Y$H$&@4$Q/5%1%1`T@8FYE(#IG;W1C:&$@ M.U!/24Y4H"A)+D4NH&&@/#Z@)&9F*0TJH&QD8:`C,#"@.W5.1DE,3$E.1Z!! M4Z!71:!'3RXN+@T@0T@96]R(",D9F8-(&)N92`Z9V]T8VAA#2J@ M;&1AH",P,`T@0T@G1E;7`@.VY/5Z!'3Z!43Z!42$6@14Y$#2`@ M(#MC05)26:!)4Z!#3$5!4@T@("`[84-454%,3%F@5T6@041$H#<-(&%D8R`C M)#`V(#LQ-J!#3TQ534Y3H$]&H#$R.*!"651%4PT@0T@;&1A(",D.#`-('-T82!B=69F97(-(&1E8R!B M=69F97(K,0T@8FYE(#IL;V]P,@T-.F=O=&-H83(@2!Y;6%X#2!B8V,@.FQO M;W`@.W5.5$E,H%=%H$A)5*!934%8(0T@8F5Q(#IL;V]P(#MW1:!.145$H%1( M1:!,05-4H$].1:!43T\N#0TJ*BHJH'-705"@0E5&1D524PT-'0L>`T@8F5Q(#ID;VYE#2!J"`P9#`P#0T@='AT("=N05)&(2<-#2HM+2TM+2TM+2TM M+2TM+2TM+2TM+2TM+2TM+2TM+2TM#2J@9%)!5TE.)Z!!H$Q)3D4NH*!AH$9! M2$Z@3$%(3BX-#2HJ*J!S3TU%H%5314953*!-04-23U,-#7!L;W1P>"!M86,@ M(#M03$]4H$&@4$])3E2@24Z@6`T@<&AA("`[=5-%H%1(25.@3TY%H$5615)9 MH%1)344-(&QD82!B:71P+'@@.WB@25.@24Y#4D5!4T5$#2!B;6D@8S$-(&QD M82`C)#@P(#MT04),1:!(05.@0D5%3J!214%24D%.1T5$#2!E;W(@8G5F9F5R M(#M&3U*@1DE,3$E.1Z!&04-%4PT@`T@861C(&1Y#2!B8V,@;#$-*J!D3Z!71:!54T6@ M:6YYH$]2H&1E>:!(15)%/PT@:68@:2Q=,2`[:4:@5$A%H$9)4E-4H$-(05)! M0U1%4J!)4Z!!3J`G:2<-(&EN>0T@96QS90T@9&5Y#2!F:6X-('-B8R!D>`UL M,2`^/CX@<&QO='!X(#MA3%=!65.@5$%+1:!!H%-415"@24Z@>`T@8W!X('@R M#2!B;F4@>&QO;W`-(#P\/`T->7-T97`@;6%C("`[0T@96QS90T@9&5Y#2!C;&,@(#MV M15)9H$E-4$]25$%.5"$-(&9I;@T@861C(&1X#2!B8V,@;#(-(&EN>"`@.V%, M5T%94Z!)3D-214%31:!X#2!S8F,@9'D-(#X^/B!P;&]T<'@-(&IM<"!L,PUL M,B`^/CX@<&QO='!Y(#MW1:!/3DQ9H$E.0U)%05-%1*!Y#6PS(&-P>2!Y,@T@ M8FYE('EL;V]P#2`\/#P-#2HJ*BJ@:4Y)5$E!3*!,24Y%H%-%5%50#0UD3([>3(-(#X^/B!S971B=68@ M.VY/5Z!71:!#04Z@0TQ/0D)%4J!42$6@0E5&1D52#0T@#(-('-B8R!X,0T@8F-S(#IC;VYT#2!L9&$@>3(@ M.VE&H$Y/5"R@4U=!4*!P,:!!3D2@<#(-(&QD>2!Y,0T@3(-(&QD82!X,0T@;&1Y('@R#2!S='D@>#$-('-T82!X,@T-('-E8PT@@83U$6`TZ8V]N="!S=&$@9'@-(&QD>"!X,2`[<%54H%@QH$E. M5$^@>"R@3D]7H%=%H$-!3J!44D%32*!X,0T-8V]L=6UN(&QD82!X,2`[9DE. M1*!42$6@1DE24U2@0T],54U.H$9/4J!X#2!L2`[ M:4:@1%DLH%=%H$Y%142@5$^@5$%+1:!"24>@4U1%4%.@24Z@60T-"!L9'D@>3$@.WB@25.@04Q214%$6:!3152@5$^@6#$-(&QD82!B:71P+'@@ M.W!,3U2@5$A%H$9)4E-4H%!/24Y4#2J@96]RH",D9F8-(&%N9"`H8G5F9F5R M*2QY#2!S=&$@*&)U9F9E0T@/CX^(&-I;FET+&1X(#MI3DE424%,25I% MH%1(1:!#3U5.5$52#2!C<'D@>3(-(&)C2`[9$^@5T6@4U1%4*!& M3U)705)$4Z!/4J!"04-+5T%21%.@24Z@>3\-#7AI;F-Y(#X^/B!X2!L9'D@>3$@.W=%3$PLH$&@3$E45$Q%H%)%4$54 M251)3TZ@3D5615*@2%525*!!3EE/3D4-(&QD82!B:71P+'@-*J!E;W*@(R1F M9@T@86YD("AB=69F97(I+'D-('-T82`H8G5F9F5R*2QY#2`^/CX@8VEN:70L M9'D-(&-P>2!Y,@T@8F-S('ED96-Y#0UY:6YC>2`^/CX@>7-T97`L:6YY#2!R M=',-#7AD96-Y(#X^/B!X2`^/CX@>7-T M97`L9&5Y#2!R=',-#0TJ+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM M+0TJH&-,14%.H%50#0UC;&5A;G5P(&QD82!V;6-S8B`[(#MC3$5!4J!43Z!%3D2@3T:@ M4$%'10T@("`[`T@9&9B("4P,3$Q M,3$Q,0T@9&9B("4Q,#$Q,3$Q,0T@9&9B("4Q,3`Q,3$Q,0T@9&9B("4Q,3$P M,3$Q,0T@9&9B("4Q,3$Q,#$Q,0T@9&9B("4Q,3$Q,3`Q,0T@9&9B("4Q,3$Q M,3$P,0T@9&9B("4Q,3$Q,3$Q,`T@+2U>#0US:6X@.W1!0DQ%H$]&H%-)3D53 M+*`Q,C"@0EE415,-8V]S(&5Q=2!S:6XK,3(X(#MT04),1:!/1J!#3U-)3D53 M#2`@(#MB3U1(H$]&H%1(15-%H%1224>@5$%"3$53H$%210T@("`[0U524D5. M5$Q9H%-%5*!54*!&4D]-H&)A;($9/4B!- M3U)%($1%5$%)3%,A#0T='9X21C$O1C*2("T@24Y#+T1%0R!8+5)/5$%424]. M#1T=$D8S+T8TDB`M($E.0R]$14,@62U23U1!5$E/3@T='1)&-2]&-I(@+2!) M3D,O1$5#(%HM4D]4051)3TX-'1T21C>2(%)%4T544PT@(%!215-3(%$@5$\@ M455)5`T-!2`@("`@(%!215-3($%.62!+15D@5$\@0D5'24X-`+'[\"D@TO_( MT/;F_$Q:@71(25,@25,@02!314-2150@5$585"!-15-304=%(2#D_\D`\/FM M%M`)$(T6T*F/A2.%):D!C2'0J9,@TO^I`(TAT*E`:0R%^ZD%A?RI`*``H@`8 MD?O(:1"0^1BE^VDHA?NE_&D`A?R@`.B*X!#0Y*E`&&D,A?NIV87\H@&@`*D) MD?O(P!#0^:7[&&DHA?NE_&D`A?R@`.B*"0@I#^`3\`K)"-#)`"Z7B%9!BE965BR7B0`NEXA648I69E8\EXD`+I>(5F.*5E MY6:P`FEXA6<8I65E9LEXD`+I>(5H&*5D96;)>)`"Z7B%:3BE9.5FL`)I>(5J M&*5D96C)>)`"Z7B%:SBE9.5GL`)I>(5L&*5D96?)>)`"Z7B%;3BE:.5DL`)I M>(5N.*5EY62P`FEXA6\8I61E9(5P&*9GO0"-IFA]`(V%I:9GO8", M.*9H_8",A::F9;V`C!`.&$G_:0$*&$G_:0%,;X,*A:%^*6M&&6K&&6LA5>JO8"-J*6G&&6E&&6FA2(82?]I`84DL2(X M\208:2"JI:H89:@89:F%(AA)_VD!A22Q(CCQ)!AI0,7WL`2%]Y`&Q?B0`H7X MJ(:2A).EK1AEJSCEK(58JKV`C:BEIQAEI3CEIH4B&$G_:0&%)+$B./$D&&D@ MJJ6J&&6H..6IA2(82?]I`84DL2(X\208:4#%][`$A?>0!L7XD`*%^*B&E(25 MI:TXY:LXY:RJO8"-J*6G..6E..6FA2(82?]I`84DL2(X\208:2"JI:HXY:@X MY:F%(AA)_VD!A22Q(CCQ)!AI0,7WL`2%]Y`&Q?B0`H7XJ(:6A*ZEK3CEJQAE MK(59JKV`C:BEISCEI1AEIH4B&$G_:0&%)+$B./$D&&D@JJ6J..6H&&6IA2(8 M2?]I`84DL2(X\208:4#%][`$A?>0!L7XD`*%^*B&KX2P&*6G2?]I`86G&*6J M2?]I`86J&*6M2?]I`86MI:TXY:L89:RJO8"-J*6G..6E&&6FA2(82?]I`84D ML2(X\208:2"JI:HXY:@89:F%(AA)_VD!A22Q(CCQ)!AI0,7WL`2%]Y`&Q?B0 M`H7XJ(91A%*EK3CEJSCEK*J]@(VHI:P!(7WD`;%^)`"A?BHAG&$ M4*6M&&6K..6LJKV`C:BEIQAEI3CEIH4B&$G_:0&%)+$B./$D&&D@JJ6J&&6H M..6IA2(82?]I`84DL2(X\208:4#%][`$A?>0!L7XD`*%^*B&LX2TI:T89:L8 M9:R%8*J]@(VHI:<89:489::%(AA)_VD!A22Q(CCQ)!AI(*JEJAAEJ!AEJ84B M&$G_:0&%)+$B./$D&&E`Q?>P!(7WD`;%^)`"A?BHAK&$LJD`A:.E`H6DA?RI M@(7[YO>I`*((H`"1HY'[R,3WT/>EQ)&CD?L8:55I`,C$^-#RJ0"1HY'[R!#Y MH`#FI.;\RM#5J0"%M:6V..57<$0896!0`J5@$#NI`86UI9*%/Z63A4"EE(5! MI96%0B"GBJ66A3^EKH5`(*>*I:^%0:6PA4(@IXJEDH4_I9.%0""GBDPIB*6V M..5@<$$895=0`J57$#BI((6UI;&%0:6RA4*ELX4_I;2%0""GBJ5QA4&E4(5" M(*>*I5&%/Z52A4`@IXJEL85!I;*%0B"GBJ6V..57<%`895E0`J59$$>I`@6U MA;6FDH8_II.&0"D!T`NEE(5!I96%0B"GBJ:QAD&FLH9"(*>*IK.&/Z:TAD"E MM2D@T`,@IXJEE(5!I96%0B"GBDS4B*6V..59<$T895=0`J57$$2I$`6UA;6F MEH8_IJZ&0"D!T`NEKX5!I;"%0B"GBJ5QA4&E4(5"(*>*I5&%/Z52A4"EM2D@ MT`,@IXJEKX5!I;"%0B"GBJ6V..57<%P895A0`J58$%.I!`6UA;6FDH8_II.& M0"D!T`NEKX5!I;"%0B"GBJ:QAD&FLH9"I;4I`M`#(*>*IE&&/Z92AD"EM2D@ MT`,@IXJFKX9!IK"&0J6U*1#08B"GBDR3B:6V..58<%4895=0`J57$$REE(4_ MI96%0*6U*0'0"Z66A4&EKH5"(*>*I;.%0:6TA4*EM2D"T`,@IXJE<84_I5"% M0*6U*2#0`R"GBJ66A4&EKH5"I;4I$-`#(*>*I/>I`(6CI0*%I*((L:-%Q-`; MD:.I@(6CL:-%Q-`/D:.%H^:DRM#E('V*3":*JBG`\`-,V(F**3#P!:D/3-2) MJ0,QHY&CI0(8:0>%I*F`A:.QHT7$T!21HX6CL:-%Q-`*D:.I@(6CQJ30YJHI M`_`#3!6*BBD,\`6I\$P1BJG`,:.1HQBEQ&E5:0"%Q,C$^/`#3)6)K1C020*- M&-"I"$4"A0+N(M#.(]!,.8)S04U%(%1(24Y'(%=%($1/($5615)9($Y)1TA4 M+"!P24Y+63H@5%)9(%1/(%1!2T4@3U9%4B!42$4@5T]23$0AH@"]C(KP!R#2 M_^A,?XI@#5-/34542$E.1R!#2$]+140@.B@-`&Y!4D8AI3^%^Z5!A?VE0(7\ MI4*%_JD`A:.E`H6D.*7]Y?NP$Z7^I/R%_(3^I?ND_83[A?TXY?N%^:;[I?M* M2DJ0!:"`A*,89:2%I#BE_N7\L`1)_VD!A?K%^;`XI/R]`(PQHY&CI?E*2?]I M`<3^L&CH9?J0`\CE^4B]`(PP#*F`1:.%HS`"YJ2I/S&CD:-HY/W0W6"D_+T` MC#&CD:.E^DI)_VD!Q/ZP5,AE^9`=Z.7Z2+T`C#`,J8!%HX6C,`+FI*D_,:.1 MHVA,=8M(O0",,:.1HVC$_M#18.AE^I`#B.7Y2+T`C#`,J8!%HX6C,`+FI*D_ M,:.1HVCD_=#=8(@89?F0'>CE^DB]`(PP#*F`1:.%HS`"YJ2I/S&CD:-H3,J+ M2+T`C#&CD:-HQ/[0T&"M&-`I]8T8T*T6T"GOC1;08&A!4%!9(&A/3$E$05E3 M(2!33$H@,3(O.30`````````/\_S_#_/\_P_S_/\/\_S_#_/\_P_S_/\/\_S M_#_/\_P_S_/\/\_S_#_/\_P_S_/\/\_S_#_/\_P_S_/\/\_S_#_/\_P_S_/\ M/\_S_#_/\_P_S_/\/\_S_#_/\_P_S_/\/\_S_#_/\_P_S_/\/\_S_#_/\_P_ MS_/\/\_S_#_/\_P@TO_H3'^*8`U33TU%5$A)3D<@0TA/2T5$(#HH#0!N05)& M(:4_A?NE087]I4"%_*5"A?ZI`(6CI0*%I#BE_>7[L!.E_J3\A?R$_J7[I/V$ M^X7]..7[A?FF^Z7[2DI*D`6@@(2C`0@D"```CR!(3TQ)1$%9(#$Y.30@+2T@ M4TQ*(#$R+S(X+SDT`$0(`0"/($E.4U!)4D5$($)9($HN($-(05).15132TD` M5@@"`(\@04Y$($]42$524RX`>0@#`(\@5$A)4R!!3%-/(%-%5%,@55`@5$%" M3$53($9/4@"7"`0`CR!42$4@4%)/1U)!32!#54)%,T0@5C(N,`"Y"`4`ES4Q M+#`ZES4R+#$R.#J7-34L,#J7-38L,3(X.IP`Q0@)`(8@5B@S-BD`X`@*`)D`CP#8 M#>H`CR!3150@55`@355,5"!!3D0@4%)/2B!404),15,`^@WK`(\@+2TM+2TM M+2TM+2TM+2TM+2TM+2TM+2TM+2TM``D.\`!$LC$W,#I:,+(U`"4.^@!+LK4H M-C2L,JU:,*HP+C4I.I`8(@2@#(#V@!GC,R-S8X.IDB2$\A($A/(2!(3R$B`.0/:0&9(D5-04E, M(%-*541$0$Y752Y%1%4@(@`&$&H!F2(@+4]2+2!!038P,4!#1DXN0U,N1$%, M+D-!("(`'!!K`9DB$4]2(%=2251%(%1/.B`B`#L0;`&9(B`@("!35$5612!* M541$("`@("`@("`@(@!:$&T!F2(@("`@,3$P,"!'4D]612`C0E<@("`@("(` M>1!N`9DB("`@($5604Y35$].+"!)3"`V,#(P,2`B`)@0<@&9(B`@("`@("`@ M("`@("`@("`@("`@("`@(@">$(8!@`#-$)`!ES(Q-"PR,CJ9(I8B.H%)LC&D M,S@Z022R022J(M8B.D(DLD(DJB(@(CJ"`.T0F@%!)+)!)*HBUM:1D2(Z@4FR M,:0R-#J9020[.H(`'!&D`9DB$QT1'B([.D(DLD(DJB(='2(Z@4FR,:0R,CJ9 M0B0[.H(ZF2(3$2(ZC@```"DI`$X/0`&75BA2*2Q2,CJ75BA2JC$X*2Q2,3I2 MLE*J,3J+4K(Q.:=2LC$`?@]*`8M#,;$Q,J=#,;(Q.D,RLD,RJC$ZF2*=(LHH M4R0L0S(L,2DBDB([.HDS-3``EP]4`9G**$8D+$,Q+#(I.SI#,;)#,:HR`*8/ M60&/("TM+2TM+2TM`*X/7@&"($H`R`]H`9XS,C248@64]5(%=!3E0@5$\@4E5.($-50D4S1#(N,2!-04M%(@","6X`F2(2 M4U5212!43R!#2$%.1T4@1"!)3B!,24Y%(#(T,"!43R(`I`EX`)DB$D0].#4@ M050@34]35"$A(2(`T@F"`)DB$0533TU%($]&(%1(12!:15)/(%!!1T4@3$]# M051)3TY3(%53140B```*C`"9(DU!62!(3U-%($)!4TE#("TM(%)%0D]/5"!" M149/4D4@4T%624Y'(@`4"I8`F2)!3ED@0TA!3D=%4RXB`$,*H`"9(A%+1450 M($E.($U)3D0@5$A!5"!93U4@0T%.(%!215-3($8Q($540R(`<@JJ`)DB355, M5$E03$4@5$E-15,@5$\@4U!%140@55`@5$A%(%)/5$%424].(@","K0`F2(1 M$2A04D534R!!3ED@2T59*2([`)\*O@"A020ZBT$DLB(BIS$Y,`#,"L@`F2*3 M0U5"13-$,BXQ($9%05154D53($U53%1)0T],3U(@04Y$($%.(@#V"M(`F2)! M4%!!3$Q)3D=,62!44DE624%,(%1%6%154D4@34%0($]&(@`A"]P`F2)!(%-/ M4E0@+2T@250@5T%3($A!0TM%1"!43T=%5$A%4B!!5"(`30OF`)DB5$A%($Q! M4U0@34E.551%+"!!3D0@5TE,3"!"12!44D5!5$5$(@!R"_``F2))3B!-3U)% M($1%5$%)3"!)3B!42$4@1E5455)%+B(`G@OZ`)DB$5=%($A/4$4@64]5($Q) M2T4@5$A%4T4@4%)/1U)!35,@04Y$(@"W"P0!F2)&24Y$(%1(14T@55-%1E5, M(2(````:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH: 6&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH: ` end ============================================================================== 2D Graphics Toolbox -- Circles by Stephen Judd (sjudd@nwu.edu) 3D is fun and interesting but in the end we must always display our work on a two-dimensional surface, the CRT. Not only are two-dimensional algorithms the foundation of three-dimensional drawings, they are of course useful for many other applications. This new series of articles is intended to complement (hah -- get it?) the 3D articles by George and myself. Between the two articles you should have at your disposal a powerful graphics toolbox for all of your applications. The foundation of all of our drawings is a single point, and a logical next step would be a line. Algorithms for doing both of these things were discussed in depth in the first article of the 3D series, so you can look those up in a back-issue of C=Hacking. What is next after points and lines? Curves! So to start with, let's think about drawing a circle. You can write the equation for a circle in many ways, depending on your coordinate system. In cartesian coordinates, the equation of a circle is: x^2 + y^2 = r^2 (1) This is a circle centered at the origin (on a computer we can always translate the points wherever we want), with radius r. In polar coordinates the equation is r=const. We can write down trigonometric relations out the wazoo, too, but no matter what it looks like we're going to have some complicated math ahead of us involving multiplications and worse, i.e. time-intensive computations. Perhaps the simplest of these would be: x=r*cos(theta) y=r*sin(theta) where theta runs from zero to 2*pi. If we have a table of sines and cosines, and use the fast multiplication algorithm given in this months 3D article, we have a routine which gives a good circle in around 50 cycles or so per pixel, sans plot. But let's step back and consider: the above equations all give a "perfect" circle. Is there any way we can draw an "approximate" circle, with a large speed increase? The answer is of course yes, since this wouldn't be a very interesting article otherwise! Let's say we are standing at a point on the circle, and want to take a step towards the next point. In what direction do we take this step? Consider a line tangent to the circle, touching the point where we are standing. If we take a little step in that direction, we ought to get close to the next point on the circle. The way to calculate the tangent line is to use the derivative, which will give us the slope of the tangent. Taking differentials of equation (1) above we have 2*x dx + 2*y dy = 0 or dy/dx = -x/y Now, if I am at a point (x,y), I want to take a little step in x and a little step in y: x = x+dx y = y+dy but from the first equation we know that dx = -y/x * dy so that at each step our iteration is y = y + dy x = x - dy*(y/x) This is the basis of our algorithm. You could also of course use x = x + dx y = y - dx*(x/y) (this is called Euler's method for solving a differential equation, and these concepts are fundamental to most algorithms for solving differential equations numerically). Let's start at the point x=r,y=0 i.e. the right-endpoint of the circle. Since we are on a computer we want to take a step of length one in some direction (i.e. step one pixel), and at this point on the circle y is clearly increasing much faster than x. You may remember from the line drawing algorithm that we viewed the process as "keep taking steps in x until it is time to take a step in y". We are going to apply that same philosophy here: keep taking steps in y until it is time to take a step (backwards) in x. So our iteration is now: y_{n+1} = y_n + 1 x_{n+1} = x_n - y_n/x_n Hmmm... we have this little problem now of y/x. I certainly don't want to deal with floating point. How do we get around this? The trick is to think of x as a _discrete_ variable -- as far as a pixel is concerned x is just an integer, and has no floating point part. So we are going to treat x as a constant, until it is time to decrease x by one! When does this happen? Let's expand the x-iteration: x_{n+1} = x_n - y_n/x_n = (x_{n-1} - y_{n-1}/x_{n-1}) - y_n/x_n This is where the magic of using a discrete x comes in. If we make this assumption of constant x, then x_{n-1} = x_n and the above iteration becomes x_{n+1} = x_{n-1} - (y_{n-1} + y_n)/x_{n-1} If we continue this process over an interval where x is constant we get x_{n+1} = x_0 - (y_n + y_{n-1} + y_{n-2} + ...)/x_0 When is it time to decrease x? When the sum of the y values at each iteration exceeds the current x-value the fraction above will be greater than one, and we will then decrease x. Like I said, we keep x constant, until it is time to decrease it! :) How long do we do this for? In the same way that at x=r y increases much faster than x does, when y=r x increases much faster than y does. Somehwere in-between they have to be increasing at the same rate, which means the slope of the tangent line is equal to +/-1, i.e. at the point x=y. At this point we have drawn one-eighth of the circle. We can either draw all eight segments of the circle independentally, or else we can use the symmetry of a circle and do an 8-way plot. TO SUMMARIZE: Here is the basic algorithm x=r y=0 a=0 :loop y=y+1 a=a+y if a>x then x=x-1:a=a-x plot8(x,y) :until x<=y Of course you can refine this in several ways, which will speed things up in assembly. For instance, if instead of a=0 we start with a=x, then the logic becomes a=a-y if a<0 then x=x-1:a=a+x To do the a=a-x you could use a table where f(x)=x, or you might try something else; here is some code in assembly: LDX R LDY #00 STY Y TXA :loop JSR PLOT8 ;Eight-way symmetric plot SEC ;Might not need this depending on PLOT8 INC Y ;Y is in zero page SBC Y BCS :loop DEX STX X ;X is also in zero-page ADC X ;Carry is already clear CPX Y BCS :loop JSR PLOT8 ;Catch the last point Starting at :loop we have 2+3+3+3=11 cycles in the best case and 2+3+3+2+2+3+3+3+3=24 cycles in the worst case, excluding PLOT8. You can, of course, change the program logic around; if PLOT8 returned with the carry always clear it would be much smarter to start A as A=256-A and use A=A+Y at each step instead of A=A-Y. Christopher Jam (phillips@ee.uwa.edu.au) suggested starting at X=Y(=R/sqrt(2)) so that the CPX Y instruction could be removed (I don't know how this affects accuracy, though). "Yeah, but how well does it work?" Quite well, as a matter of fact. It will draw a perfect circle for circles with a radius greater than twelve or so. For circles with a smaller radius the sides start to flatten out, and the circle becomes squareish. Interestingly, the "discrete x" approximation improves the result over the straight floating-point calculation significantly! So this is the best algorithm I was able to come up with for drawing a circle. If you have any suggestions for improvements or other ideas, please feel free to share them :). As always I must thank George Taylor and Christopher Jam for their suggestions and for helping me work out some ideas. If you have any particular 2D algortihms/calculations that you would like to see, please feel free to suggest future topics for the 2D graphics toolbox. Finally, here is a BASIC7.0 program which demonstrates the algorithm: 0 REM FAST CIRCLE -- SLJ 9/94 10 GRAPHIC 1,1 15 REM X=Radius 20 X=40:Y=0:TX=X:XO=160:YO=100 30 DRAW1,X+XO,Y+YO:DRAW1,Y+XO,X+YO 40 DRAW1,XO-X,YO+Y:DRAW1,XO-Y,YO+X 50 DRAW1,XO-X,YO-Y:DRAW1,XO-Y,YO-X 60 DRAW1,XO+X,YO=Y:DRAW1,XO+Y,YO-X 70 IF X<=Y THEN 100 80 Y=Y+1:TX=TX-Y 90 IF TX<0 THEN X=X-1:TX=TX+X 95 GOTO 30 100 END =========================================================================== AFLI-specs v1.0 by written by D'Arc/Topaz for Chief/Padua on 28.6.1994 Advanged FLI is name I came up with during the time I coded the first version of AFLI editor. I have never claimed to be the one who discovered this new graphics mode for 64. I myself give the credit for COLORFUL/ORIGO but I am not sure if anyone did it before him (splits have been done but in my eyes they don't count). In AFLI we can get 120 colors in theory (counted like this 16!/(2!*14!)=120). When we put red and blue hires pixels close to each other we get a vision of purple - thanks the television. AFLI is just like FLI with $08-$0f (hires value) in $d016 and a couple of sprites over the first three marks. With $d018 we change the start of screen memory. And the good old $d011 for the main work. AFLI is the same as FLI but we don't use the $d800-$dc00 area for the third color. Actually we can't. In normal hires pictures the colors on the picture is ordered in a normal screen (normal text screen is on $0400+). The upper 4 bits is the color for bit 0 in picture bitmap and the lower 4 bits is the color for bit 1 in picture bitmap (or the other way...but let us think that was the right way). For example: a normal hires picture char (8x8 bits) 01234567 in hires picture where 01234567 0 ***** the first spot of the 0bgggggbb 1*** *** screen has a value of 1gggbgggb 2*** *** $68 (blue&green) the 2gggbgggb 3******* hires picture looks 3gggggggb 4*** *** like this ----> 4gggbgggb 5*** *** b=blue, g=green 5gggbgggb 6*** *** 6gggbgggb 7 7bbbbbbbb The bitmap is built just as in a hires picture bit 1 means the pixel is on and 0 that the pixel is off. In FLI we have built the screen to have badlines on every scanline of the screen. This gives us the possibility to change the screenmemory the picture uses on everyline. Now... when AFLI (and FLI) uses screen memory for colors and we change the screenmemory start on everyline, we can have new colors on everyline. The screens are usually ordered like this. screen memory used 0 $4000-$43ff 1 $4400-$47ff 2 $4800-$4bff 3 $4c00-$4fff 4 $5000-$53ff 5 $5400-$57ff 6 $5800-$5bff 7 $5c00-$5fff $6000-$7fff BITMAP (the actual picture data) The number of the screen is considered as the number of the line in 8x8 pixel area. An example... Here we have cut from the memory showing the first bytes in every screen. screen/rownumber 00 01 02 03 04 05 06 07 08 09 10 11 12 13 ... 39 $4000 ff ff ff 56 .. .. .. $4400 ff ff ff 67 .. .. $4800 ff ff ff 91 .. $4c00 ff ff ff b3 $5000 ff ff ff 54 $5400 ff ff ff 8f $5800 ff ff ff 54 $5c00 ff ff ff 10 Actually the $ff won't have to be there. It will come to the screen anyway. We have the same 'A' on the screen on the fourth mark ($6018- $601f). BITMAP AFLI PICTURE (number is the color number) 01234567 screenvalue 01234567 0 ***** $56 0 56666655 1=white, 0=black, 2=red ... 1*** *** $67 1 77767776 2*** *** $91 2 11191119 3******* $b3 3 33333333 4*** *** $54 4 44454445 5*** *** $8f 5 fff8fff8 6*** *** $54 6 44454445 7 $10 7 11111111 Now the 'A' surely has a lot of colors. When we code a FLI routine we know that we have succeeded when we get a 3 marks wide area filled with value $ff on the screen. In FLI the thing is easily taken away; we just fill the three first bytes of a line with empty bytes ($00). In AFLI the value $ff is a color. If we try to clear the three first marks, we still have the gray area. WHY? The $ff value comes to the screen.. so... the $ff is a color and the upper four bits of the byte is the color for empty pixels. We can not clear the first three marks to wipe the thing off. We have a new lovely problem: we have to put black (or whatever) sprites over that area. This is just timing. This may look very complicated and I think you will still be asking many questions from me - the text I have written surely ain't the best novel ever written. I'm great in jumping from a thing to another. -- Chief/Padua +44 (0) 757 706791 -------------------- My opinions are not my employers =========================================================================== Coding Tricks The following are messages posted to comp.sys.cbm that contain little "coding tricks" that I thought were useful. If you've got any of your own that you want to post feel free to email them to me and I'll post them to comp.sys.cbm - duck@pembvax1.pembroke.edu. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - From: paulvl@python.es.ele.tue.nl (Paul van Loon) Date: 11 Oct 1994 14:28:49 GMT Hello everyone, I really would like to start a thread on your favorite sequences of 6502 code. I hope much people will react so we can build up a library of the most beautiful 6502 code ever seen. I would suggest little code fragments, probably not longer than 10 lines, doing some tiny function. I propose the following standard: ----------------------- "text" ; comment ; comment "description" ----------------------- where is the symbolic name (3 letters?) you give to your code sequence, describes your arguments "text" gives a full name to pronounce for the symbolic name and and on are the 6502 instructions you use. "description" is a description of the functionality of your code. The lines with "---" are seperators. I will hereby start with my all-time favourite code, I discovered it only recently and I will also show some examples of how to use it! --------------------------------------- B7C "Bit 7 to Carry" cmp #$80 This instruction copies bit 7 of A to C --------------------------------------- This is really a beauty! It works because cmp clears the carry if A is below the immediate value, and sets it if A is higher or same. All values lower than $80 have bit 7 equal 0, cmp will clear C for all values below $80, and thus will 'copy' bit 7 into carry. All values equal or above $80 will have bit 7 equal 1, cmp will set C for all values above $80 and thus for this case it will also 'copy' bit 7 into carry! ------------------------------------------ ASR "Arithmetic Shift Right" B7C ror This instruction does a signed divide by 2 ------------------------------------------ Again a beauty in my eyes! I have puzzled many times who to write the on other CPUs well-known ASR instruction, but I never seemed to get it implemented without an extra register to use like: tax asl txa ror or even without a branch (figure that out yourself!). With these two beauties I want to give you an idea of what I mean, and please follow me up!. BONUS. A little routine to clear the screen without erasing the sprite pointers. ----------------------------- CLS "Clear the screen" ldx #250 lda #$20 clp sta $0400-1,x ; 0-249 sta $0400+249,x ;250-499 sta $0400+499,x ;500-749 sta $0400+749,x ;750-999 dex bne clp Clear only the screen ---------------------------- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - From: paulvl@python.es.ele.tue.nl (Paul van Loon) Subject: Re: Post your favourite little code too! Date: 20 Oct 1994 12:17:40 GMT ------------------------------------- RSL "Rotate Straight Left" B7C rol This instruction does a rotation left through 8 bits (rol does a rotation left through 9 bits, 8 bits of A and 1 bit C) ------------------------------------- Another useful instruction, for a wraparound rol, e.g. for rotating bytes in characters to simulate parallax scrolling. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - A reliable way to create a Straight IRQ? Well, this is the way I've always used, because it's reliable, flexible doesn't mess up, or set restictions on the display, unlike routines that depend on D011 etc... This one only observes the VIC chip: It's some time since I actually coded a routine of this kind, and I'm writing this off memory, so there might be some errors in the following code. ... jmp mainPrg ;----------- Standard routines for all sharp irqs ---------------- sharp inc $d012 ;Set interrupt to the next line. inc $d019 ;Ready for new interrupt ;same as lda #1 : sta $d019 sta storeA lda #sharpirq sta $ffff cli ;Allow new interrupt even if we ;still are in the previos irq call noploop nop nop ; We add nop's here so that the next interrupt ; will interrupt while we are executing nop ... ; commands. Since nop commands use two cycles ... ; the interrupt will at most be delayed 1 ... ; cycle. ... ; I think we needed about 11 nop's to be sure ; that execution is interrupted while they are ; run. (I'm not sure about this number) jmp noploop ; Although we are sure that the interrupt will ; interrupt before we reach this point, we ; add this loop to be on the safe side. ; Imagine if the program happened to be frosen ; by a carterigde and later restarted while ; executing the nop's. sharpirq pla ; Delete data put to stack by the last pla ; interrupt, we don't intend to return from pla ; it. stx storeX sty storeY nop ; Now we only have an uncertainty of 1 cycle nop ; as to where the interrupt is. ; By waiting until the edge of the current ; rasterline we can determine if the interrupt ... ; was delayed by one cycle or not. ... ; (How many nop's that is required to reach the ... ; edge of the rasterline i don't remember. ; You'll just have to find it out yourself) ; These nop's may of course be exchanged by ; equivelent time consuming instructions. lda $d012 ; get current rasterline cmp $d012 ; still on same line = was delayed; bne addCycle ; add 1 cycle if not delayed. addCycle ; doing a branch jump takes 1 cycle more than ; not doing one. ; the rastertiming is now 'straight'/sharp rts ; return to routine that cal led sharp endIrq ; restore a x y storeA = * + 1 lda #0 ; For those who don't like self modifying code storeX = * + 1 ; this can be changed easy. ldx #0 storeY = * + 1 ldy #0 rti ; Return from interrupt. nextIrq stx $fffe sty $ffff sta $d012 inc $d019 ;or lda #1 : sta $d019 if you prefere rts ;------------------ The actual interrupt ------------------------------ irq1 jsr sharp ;Make interrupt sharp and store A X Y regs. ldx # ; is the next interrupt that is due ldy #>irq ;1 if irq1 is the only interrupt. lda # jsr nextIrq jmp endIrq ;--------------- Main program --------------------------------- mainPrg cli ;allow interrupt sei rts ; Or jmp exitCode ******************************************************************* By adding this routine: saver sta storeA stx storeX sty storeY rts ...you can at any time turn on/off the sharping by exchanging 'jsr sharp' and 'jsr saver'. I hope this is what you were looking for. Sorry for not supplying a complete source, but as I said this is all from memory. PS. My native lanuage is not english and I typed this in a hurry, so sorry for the lousy lanuage / source. Furhermore, ways of getting an rnd. * lda $d012, only in large complex programs with lots of variable execution times where rnd is only needed once in a while. (Never use in raster interrupts of obvious reasons) * lda $d800 ; The 4 upper bits of mem at area $d800 - $dc00 are completly lsr ; unpredictable... lda $d801 lsr lda $d802 ... * Read the values from the white noise generator to the SID. 3rd voice set to whitenoise, and read the result. (sorry don't remember address to read, think it is around $d416-$d41c) These give you _true_ random numbers. It's also possible to create 'random' routines that create 'random' numbers based on a seed value. Anything unclear? Mail me at s514@ii.uib.no Bye... - Rolf Wilhelm Rasmussen Equal of Eternity =========================================================================== C.S. Bruce Interview by Craig Taylor (duck@pembvax1.pembroke.edu). The following is an interview of Craig Bruce, author of numerous programs such as ZED, ACE etc for the Commodore 64/128. > What computer experience did you have before the Commodore computers? Very little. I was 14 at the time, in grade nine, and it was December 1982. My Jr. High school had a few CBM 8032s, but I never actually got to touch one. I took a "mini course" on computers and learned a tiny little bit about what computers were like and about BASIC. To give you an idea of how little I learned, I was entirely incapable at the time of figuring out how to increment a variable (X=X+1). > What was your first Commodore computer and why? My first computer was a VIC-20. I had the choice narrowed down to a VIC, a TI99-4A, or a Timex/Sinclair 1000(?). (I don't think I had heard of the Ataris or the Apple). I chose the VIC partly because it was related to the computers at school but mostly because it had the most impressive brochure and I had the most information about it. It was theoretically a Christmas present, but it didn't stay in the box very long. I paid half of the $400.00 price tag and my parents paid the other half. > How did you learn programming on the Commodore? Did experience from other PC's help? Ahhh, those were the days. I learned programming from a few sources. The user's guide that came with the VIC was quite helpful, and I read the magazines of the day, mostly Compute!s. I also had a friend who went to high school and used the computers there who knew a thing or two, and two other friends who got VIC-20s soon after me, so we learned from each other. I also took a relatively informal night course that was offered for programming VIC-20s. By the time I took it, though, I had already learned just about everything that the course tought: BASIC. Then, in the last class, the instuctor talked just a little bit about machine langauge, just enough for me to understand what was in the VIC-20 Programmer's Reference Guide. I learned 6502 machine language shortly after that. Experience from other PCs didn't really factor into things, since I had no experience with any other PC. However, when the time came to learn about other computers and other programming languages (in high school and bachelor university), I had an enormous advantage over the other students, since I understood so thoroughly how computers worked because of my VIC-20 experience. > What other interests, besides hacking on the Commodore, do you have? Not many. I don't get out much and I have only a handful of friends. I spend most of my time sleeping, watching TV, net surfing, doing school work, and/or hacking on Commodores. Hacking on Commodores is in my blood. While I'm doing these other things, I'm usually thinking about hacking on Commodores. You might say that I'm a sterotypical total computer geek. I do like biking, though. I bike to school every day. And music. > What is your feelings on the demise of Commodore? Losing Commodore was a little sad, but as someone said on the newsgroup when Commodore went under, "What has Commodore done for you lately?". We 8-bitters lost all support from Commodore long before its demise. I certainly don't blame them; 8-bit computers are a thing of the past and there wasn't a big enough market to support a company the size of Commodore. > Do you see anything in the future that signals anything that will extend the useful lifetime of the Commodore 8-bits? IMHO, there are only two things that 8-bit computers need to survive in the hands of hobbiests indefinitely: serious system software and modern hardware peripherals. Some serious system software has begun to surface recently :-), and Creative Micro Designs has been providing modern peripherals for us to use. New application programs are needed too, but I'm assuming that hobbiests + serious_system_software --> serious_new_application_programs. (Perhaps this is a bit self-serving). Eight-bit computers have two big advantages over bigger PCs: a much lower price and a much higher understandability quotient. Both of these are very important to hobbiests. > Do you feel that with the addition of newer periphials that are gradually superceeding the CPU's job (REU, RamLink, SwiftLink etc...) that the Commodore 8-bit standard machine is no longer standard?? Indeed, there are lots of options. But I think that this is a good thing. The original Commodores are quite limited, and this modern hardware is needed to allow the Commodores to remain useful in the networked world. An important feature of all of these new products is that you can flip a switch or pull out a cartidge and you're back to your little old standard Commodore. Of course, who really wants to do this. The reason that I have stayed with my little Commodore for all of these years is that I believe that it still has quite enough power (using modern peripherals and expanded memory) to do what I require of it. For example, it's quite possible to have a nice little 17K text editor that can edit huge files and be very useful. You don't need a multi-megabyte program with all kinds of snazzy features that requires a monsterous machine to run on to do this. These multi-megabyte programs are simply bloated and poorly designed. > Will there ever be an update to Zed? (a question asked on a lot of the commericial providers) Yes. I've been promising this for a long time, but the right time to do this is finally near. > What is the process that you use for writing your programs? I'll start this answer with a Unix-fortune quotation: "Real programmers don't draw flowcharts. Flowcharts are, after all, the illiterate's form of documentation. Cavemen drew flowcharts; look how much good it did them." For complicated algorithms, I'll sit down write some pseudo-code, and I always plan and write out complicated data structures. But other than this, I usually just sit down and write code, after kicking ideas around in my head long enough for me to know what I have to do. > It's been noticed that you have a "fanatacism" about speed in your programs. Can you elaborate on this? Guilty as charged. As I said above, I despise bloated software that needs a mega-machine to run on fast enough. I like software that is sleek and mean, and I have an axe to grind that little 8-bit Commodore computers offer quite enough computing power for most applications that most people would use them for. The exceptions are number-crunching, huge-data processing, and heavy computation. However, for most interactive programs, an 8-bit processor is quite enough. So, I grind my axe by producing fast programs. Arguably, that effort is sometimes misspent (like in the printing to the screen in ACE -- I still have a few more tricks up my sleeve though...), but I like to go a little too far sometimes to make people go, "Wow! I didn't know this little machine could do that so fast!!" I like to upset the notion that you need a huge machine to get adequate performance. (In fact, sometimes the opposite is true, since programmers assume that they can be extra sloppy when programming for huge machines). As a user, I like crisp responsiveness. This is a feature of personal computers that can sometimes be absent on big multi-user virtual-memory machines. I also have a big thing against backwards compatibility ("hysterical raisins"). This is a significant cause of software bloatedness. This is one reason that ACE, for example, was designed from scratch rather then with the pre-set limitation that all BASIC-compatible programs should run with it (a la CS-DOS). > Is there anything that you find particularly useful / handy about the Commodore's architecture? Yeah, it's simple. > And the corallary: Is there anything particularly annoying? Yeah, it's limited. > What is currently in the works / planned?? My Commodore job queue looks like the following: 1. Update my Unix VBM file filter. Make it produce a new format of VBM files with run-length encoding compression. Investigate LZW(?) compression. 2. Work on ACE release #13: Internal cleanup. Reorganize the internal memory usage, add features to the command shell, clean up memory and device management inside the kernel, update the VBM program, add a SwiftLink device driver, make a simple glass-tty terminal program. 3. Develop a new portable archiver format and write a C program for Unix, ".car" format. 4. Write my next article for C= Hacking, which will be about the detailed design of a distributed multitasking microkernel operating system for the C128. This article will also include a minimal multitasking implementation. 5. Work on ACE release #14: Port Zed to ACE. Get the basic editing features going. 6. Work on ACE release #15: Finish the ACE assembler. Add the file-inclusion, conditional and macro assembly features. Make it accept more dyadic operators in expressions, fix the label typing, make it generate relocatable executable code modules, and make it handle modular compilation (".o" files). 7. Work on ACE release #16: Archiving. Update the "bcode" and "unbcode" programs to support uucode, nucode and hexcode formats. Toss the old "uuencode" and "uudecode" programs. Implement "car" and "uncar" programs. Look into "zip" format. 8. Start on BOS, the distributed multitasking microkernel operating system for the 128. (Actually, some of these things will be done by the time that C= Hacking comes out). Keep on Hackin'! =========================================================================== Aligning 1541 Drives by Ward Shrake (taken from comp.sys.cbm) A discussion regarding Commodore 1541 disk drive alignment procedures, with suggestions. Background information. The best way I've ever seen to consistently and reliably get a 1541 disk drive aligned perfectly, was caused by copy protection. It is sort of appropo that copy protection, which usually causes the "head knock" problem that puts drives out of alignment in the first place, should also be able to solve the problem it created. An older version of a disk utility program, ("Disector" v3.0, as I remember it), had copy protection that would not let you load the disk up unless your disk alignment was perfect. While initially loading itself, it would search and search, never quitting, until it found what it was looking for, exactly where it was looking for it. It would stay in an endless loop, searching forever, never making it to so far as the first screen. This essentially "locked up" the computer, if the program thought the disk it was on was an illegal copy. This quickly became the most hassle-free, no-worry alignment program I've ever seen. I have seen and used most of the others; this method beat them all, no contest, in my opinion. The other programs, the ones made for aligning your drive, never consistently worked acceptably well, in my experience. Other technical users apparently feel the same way about them, as the "General FAQ, v2.1" on Commodores points out. They would work OK part of the time, or on part of the drives you tried, but not all, I found. Or they would say you now had a perfectly-aligned drive, but some difficult copy protection schemes would still not load and run on the newly tuned-up drive friend. A friend of mine, now deceased, once had a drive no alignment program could fix. We tried everything we could find. After aligning it with a given method or program, some programs would load that would not load before, but others would now no longer work, that used to work before. All in all, it was very frustrating, and the general feeling was that there has to be a better, easier, more reliable way to do this. All an alignment program has to do, is to make sure that when the disk drive says it is precisely at a given track's physical location, that it is really there, centered on that track. There are other Commodore adjustments, but alignment seems to be, by far, the most common problem. Disk drive rotational speed can be adjusted, but it usually is not the problem. In fact, I've seen more than one drive, that when adjusted to read a program-reported "perfect" 300 rpm rotation speed, they quit reading disks; requiring speed to be set at a reported 310 rpm, to work again. The end stop gap can also be adjusted, but I've never seen it be the real culprit with a non-working disk drive. Your experience may vary, of course, but I've always found that it is best to concentrate on alignment first, then fool around with the other adjustments ONLY after alignment is truly corrected, and only if it still refuses to work properly. Once alignment is corrected, there are methods available to insure that it stays that way. For instance, you can have the stepper motor's pulley mechanically pinned to its shaft, instead of merely relying on the factory's interference fit to hold it. Commodore 1541 drives were made to be self- aligning, apparently, which would be fine if "head knocking" protection schemes were not around. Since they are, the pulley should, ideally, not be allowed to turn on its shaft, which is what causes misalignment problems. How I used to align 1541 disk drives.... To precisely align a given 1541 disk drive, I used the old, unbroken copy I had of Disector (v3.0, I think), and followed these steps. With power to the drive off an disconnected, you first took off the upper and lower halves of the outer plastic casing of the drive. This exposed the electronics inside. You then found and loosened (but not removed!) the two stepper motor mounting screws, which are on the underside of the disk drive's internal mechanisms. After that, you hooked the power cable back up, and hooked the drive to the computer like it normally is. Once you've done this, you set the drive up on one side, so that you can (carefully!) reach into the mechanism, to physically rotate the stepper motor, which would normally be on the bottom of the drive. You type in the program's loading instructions on the computer, and you then wait until the screen went black (copy protection searching for certain info on the diskette). This is where the program "locks up," with the unaligned drive. Once the program is loading, but stuck and unable to find what it wants, you reach into the mechanism, very slowly and carefully, turning the stepper motor a slight bit in either direction, and stopping. Tiny adjustments are a lot; don't overdo it. Be patient; don't go too fast, or move it too much! You watch the screen carefully, and listen to the drive's sounds. When you have rotated the stepper motor to the proper place, the sounds and the screen will act a little different, perhaps only slightly so. Wait a second, not moving the stepper motor at all. When you are right on, alignment-wise, the program will find what it is looking for, and the program's main menu will appear. Once the main menu has come onto the screen, you have a perfectly aligned drive. Then you have to retighten the stepper mounting screws, being very careful not to accidentally move the motor in the process. Hold the motor firmly while retightening both screws in small steps, alternating back and forth between them until they are both tight. The rotational force of the screws turning, forces the motor to move some, so watch for it. With this method, using a specially-prepared disk, I always got perfect results; everything would load, every time, from then on. (Assuming that the disk was formatted with a good drive to begin with; any disks you made recently, on your badly-aligned drive, may not load after the alignment procedure. Transfer the info on these disks, to a second, known-good drive, before you do this procedure. This is normal, however, no matter what method you use to align a bad drive.) Here's the problem with this method... This procedure only works with a special disk, one that is no longer available. With the special disk, alignment is quick, hassle-free, and it always gave excellent, reliable results the first time around. Without the "perfect" disk, this procedure is worthless. This is obviously a problem, since the method relies on a disk that is no longer available to the public. You can't make your own, because you don't know if the disk drives you are using, are truly perfect to start with! Disks made by users, on Commodore equipment, never worked; they just matched your drive's alignment to that of someone else's equipment, which may be borderline bad to start with. Here's what I suggest to solve this... Your mission, should some hot programmer out there choose to accept it, is to create a program that will create a "special" disk, and a Commodore-compatible program to try to read that special disk. Ideally, the Commodore-compatible reading program would be short and simple enough to fit inside 8k of memory, so it could fit on a cartridge. This would allow it to work, even if a user's disk drive would not load programs anymore. It could still be stored on a diskette, too, with a little planning. Theoretically, once you had the specially-formatted diskette, and the program on cartridge, you would only need a screwdriver to take the drive apart, and a Commodore microcomputer to run the program on. No other special tools would be needed, and very little technical knowledge would be required; just some general safety tips, because you are working around sensitive electronic parts, with wall current coming into the drive itself, at least on older 1541's. Why should a programmer go to all the trouble? I'm sure there are a lot of people out there who could use this, if some hot programmer should decide to write it, and make it available to the rest of us. There are always programmers out there, somewhere, eager to show off their computer skills, and their creativity. It is one of the things that makes the computer community so great in the first place. (If people out there can write IBM-to-Commodore disk file readers, this should be a breeze!) Techies should appreciate it as a great, reliable and cheap way to align troublesome disk drives, and those people with a C64 in a closet would sure appreciate their technical buddies getting their dead systems going again! Description of what I have in mind, as to how it should work. You need a Commodore computer (the 64 is most popular), one 1541 disk drive that needs alignment (or that you want to check), a screwdriver to open the drive up, a specially-prepared disk used only for alignment purposes, and a computer program that would run on the Commodore that would look at and analyze the information that is on the specially-prepared diskette, as the computer program tries to read it. OK. Here's where it gets cute. The problem with most disk alignment methods, as I see it, is that it relies totally on technology that the Commodore has available; trying to create a special disk on a 1541, I just don't see as being realistic, or the best way to do it. The 1541 has many limitations, compared to some other disk drives which operate on other computer platforms. Don't get me wrong; I love Commodore computers, and have for years. But, realistically, the 5.25 inch drives found in say an IBM machine, are just plain better in many ways than the 1541. They are made to hold much more information, and to do that, they have to be much more precise in doing so than the 1541 was ever designed to be. If a person were to do this, I would suggest that they write an IBM program that would use a high density, 1.2 megabyte capacity, 5.25-inch type of disk drive to create the special diskettes, which the 1541 would later read. Doing this would allow the creation of very thin tracks on the diskette's surface, spaced closely together. This would, within the limitations of the 1541's read head, allow the Commodore to "see" precisely where it currently was, to one side or the other of some "centered" position. The advantage of thin tracks, widthwise, is that the read head won't see them at all, reliably, unless you are exactly, perfectly right on top of them. Another advantage to this, again within the limitations of the 1541's read head (whatever that may be), is that left or right of center, the head would likely pick up the next track over, letting you know you were off by a certain amount automatically. I hope I'm making myself clear, in my explanation of this. If I am not, Email me with your questions, and I'll try to answer them better, and/or update this file, to entice someone else to work on this. I really would like to see it done. (Current Email address, as of Sep 94: wardshrake@aol.com on the Internet, or just WardShrake on AOL. Will soon have a Compuserve Email address, too: I'll be user 75207,1005 there, or 75207.1005@compuserve.com on the Internet.) Anyway, let's continue. With the IBM creating a specially-made disk just for this one purpose, you would not even have to worry about following any standard formatting procedures. No user-stored data would ever be written to the diskette, so standard sectoring could be safely ignored. You could create any signal or sectoring scheme you like, as long as the IBM could create it, and the Commodore could read it; and you'd be writing both programs, anyway, making this easier to insure, right? I can hear some die-hard Commodore users saying, "I hate IBM's" or "I don't even have an IBM" or some such. Fine. Not a problem. If all the IBM-compatible program did was to create a special floppy disk, once, then quit, you would not even need to OWN an IBM, you'd just need to be able to USE one for a few minutes. Even if you don't have access to one at work, and don't know of anyone who has one to lend you, I will stick with this suggestion, because I know that some businesses that make photocopies often also rent IBM's and Mac's on an hourly basis, for very little money. My local Kinko's copy center rents them both at $10.00 an hour. You would only need it for a few minutes or so. The diskette-creation program would only need a few minutes to run, to make up a special disk, so you'd only be paying for a good quality, blank high density floppy, and ten or fifteen minutes of rental time, tops. The copy center person may even be able to start up the floppy-based IBM program for you, if you don't know how to do it yourself. That should come to $5.00 or less, even if you don't own or normally have access to an IBM compatible computer! You can't beat that, for a utility to align equipment! OK. In overview, you'd need to use an IBM-compatible computer, just long enough to load an IBM-compatible program which would create one special, 5.25" diskette, perhaps on a high density floppy. You would then open up your Commodore drive's case, and start up a special program on your Commodore 64, to read the created diskette. (Again, an 8k Commodore program would fit very easily on a cartridge, for easiest loading and running.) While the computer and drive were running, you would (very carefully, and observing safety precautions) loosen the stepper motor's screws, and slowly turn the motor clockwise and counter-clockwise, until the Commodore program's screen info told you that you were exactly where you should be, right over the proper track. Not to the left or right of it, but in perfect alignment. Because the Commodore disk-reading program would be "on" constantly, and reporting any small changes to you via information on your screen, you would only have to take a few minutes of fiddling, doing a simple, non-technical turning of the stepper motor, to get the drive aligned. The two computer programs that would make up this package would be doing most of the work. I imagine a drive could be perfectly aligned, and back in running order, in fifteen minutes or less. Five, if you paid attention to the process, and had some practice before. Remember, this is based on an alignment procedure I really used to do, using a heavily-protected diskette, so I am extrapolating from my personal experiences, even though I'm talking about a theory here. I don't see where there would be any easier, simpler method of doing a disk alignment. The user wouldn't even have to know a thing about tracks and sectors; they would just loosen two screws, following some instructions, and turn the motor. What could be any easier? The program could, if it was really creative and well-done, tell them to rotate the motor clockwise or counter-clockwise (as they face it), to dial the motor precisely in. Tracks to either side of an arbitrary (track 18?) center position would say to go one way, tracks on the other would say the reverse. When you turn it too far one way, it would reverse its instructions to you; you would know you were very close then. When you were "right on," the program would tell you so. You'd lock the screws down, carefully, and as long as you hadn't jiggled the motor when you tightened it back down, you would be all done! How much easier could it be, right? (On the final user, that is!) If anyone is interested in doing this, or goes out and does it, please let me know via Email. I'd like to hear about it. Again, it would be something possible, useful, and a really neat trick. I know there are people out there that program on both the IBM and the Commodore; the various cross-reading programs attest to that, well enough! Ward Shrake Covina, California ==================================================================---END---=== .. .