Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Associative Memory Organisations?
The associative memory is arranged in w words with b bits per word. In w x b array, every bit is known as a cell. Every cell is made up of a flip-flop which comprises some comparison logic gates for read-write operations and pattern match. So it is possible to write or read concurrently because of this logic structure. A set of bit cells of all the words at the same place in vertical column is termed as bit slice as displayed in Figure below.
Figure: Associative memory
In organisation of an associative memory subsequent registers are used:
• Comparand Register (C): This register is used to hold operands that are being searched for or being compared with.
• Masking Register (M): It might be possible all bit slices are not involved in parallel operations. Masking register is used to disable or enable bit slices.
• Temporary (T) and Indicator (I) Registers: Indicator register is used to hold the current match patterns and temporary registers are used to hold the prior match patterns.
What are the types of security features employed in client server kinds of network? Security features employed in Client-Server types of network are as illustrated below: a)
Electrically erasable programmable read only memory (EEPROM) An EEPROM is a special type of PROM which can be erased by exposing it to an electrical charge. Like other kinds of
Full form of is DHCP: Dynamic Host Control Protocol. It is mainly used to bound MAC Addresses of system. Especially for Wireless System.
Pruning - artificial intelligence: Recall which pruning a search space means deciding that there certain branches to should not be explored. Moreover if an agent knows for sur
With a C program to read the text book number, title, author and publisher into a structure and print these values. # include # include void main() { struct boo
Here are some common development milestones that you should aim for: 1. Send a packet over. Send an acknowledgement back. 2. Have checksum algorithm executed 3. Ability t
Explain the outsourcing barriers that an organization faces. 1. Critical operations that cannot be outsourced. 2. Negative customer reaction. 3. Employee resistance. 4
Modus ponens rule: In fact the general format for the modus ponens rule is as follows: like if we have a true sentence that states the proposition A implies proposition B and
Hill Climbing - Artificial Intelligence: As we've seen, in some problems, finding the search path from primary to goal state is the point of the exercise. In other problems, t
Desk Top Publishing (DTP) As word processors develop increasingly more sophisticated features, differences with desk top publishing (DTP) packages becomes more and more blurred
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd