Data alignment in processor arrangements, Computer Networking

Data Alignment

Arrays are aligned to templates by the ALIGN directive. The ALIGN directive is used to align elements of different arrays with each other, indicating that they should be spreaded in the similar manner. The syntax of an ALIGN derivative is:

!HPF$ ALIGN array1 WITH array2

where array1 is the name of array to be aligned and array2 is the array to be aligned to.

Example 6

Consider the statement


This statement aligns each A[i] with B[i] as shown in Figure.

1980_ALIGN A[i] WITH B[i].png

                                                                                                                        ALIGN A[i] WITH B[i]

Consider the statement


This statement aligns the each A[i] with B[i+1] as shown in Figure.

2141_ALIGN A[i] WITH B[i+1].png

                               ALIGN A[i] WITH B[i+1]

* can be used to fall down the dimensions. Consider the statement

ALLIGN A[:, *] WITH B[:]

This statement aligns two dimensional array with one dimensional array by collapsing as shown in Figure.



Posted Date: 3/2/2013 8:10:53 AM | Location : United States

Related Discussions:- Data alignment in processor arrangements, Assignment Help, Ask Question on Data alignment in processor arrangements, Get Answer, Expert's Help, Data alignment in processor arrangements Discussions

Write discussion on Data alignment in processor arrangements
Your posts are moderated
Related Questions
What is packet filter? Packet filter is a standard router up to with some extra functionality. The extra functionality permits every incoming or outgoing packet to be inspected

A multimeter is used to measure a sinusoidal signal and reads 2V RMS; what is the peak-to-peak voltage of the signal? A mark will be deducted if you do not quote your answer to 2 s

TYPES OF WIRES:  Cable used for wiring would match the following: The intended speed The distance between computers The amount of noise Anticipated future r

OSI Reference  Model Normal 0 false false false EN-IN X-NONE X-NONE

Bootstrapping all the processes and establishing correct lines of communication is, by itself, the toughest aspect of this assignment. Before writing any code you should think care

FIBER OPTIC EXTENSION:  The LAN extension using fiber optic is given in the figure below:   Figure The fiber-modem translates digital data into pulses of light the

Advantages of LS over DV algorithm There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. The

Network Problems Q1  Consider the single-sender CDMA example in Kurose & Ross. What would be the sender's output (for the 2 data bits shown), if the sender's CDMA code were (

Question: a) The cpio utility has three operating modes. What are they? b) The characters of the permission string are broken up into three groups of three characters. Ex

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program