Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Block diagram of an associative memory?
The block diagram of an associative memory is displayed in Figure below. It comprises of a memory array and logic for m words with n bits per word. Argument register A and key register K both have n bits, one for every bit of a word. Match register M has m bits, one for each memory word. Every word in memory is compared in parallel with content of argument register then the words which match the bits of argument register set a corresponding bit in match register. After matching process those bits in match register which have been set denote the fact that their corresponding words have been matched. Reading is achieved by a sequential access to memory for those words whose corresponding bits in match register have been set.
Key register offers a mask for choosing a specific key or field in argument word. The complete argument is compared with every memory word if key register contains all 1s. Or else only those bits in argument which have 1s in their corresponding positions of key register are compared. So the key offers a mask or identifying information that specifies how reference to memory is made.
Figure: Associative Memory - Block Diagram
To explain with a numerical illustration assume that argument register A and key register K have the bit configuration displayed below. Only three leftmost bits of a compared with memory words since K has 1's on these positions.
A 101 111100
K 111 000000
Word 1 100 111100 no match
Word 2 101 000001 match
Word 2 matches unmasked argument field since the three leftmost bits of argument and word are equal.
What is the Role of Certifying Authority? A certificate authority is a body, that is either public or private, that seeks to fill the requirement for trusted third-party servic
With the help of clocked JK flip flops and waveforms, explain the working of a three bit binary ripple counter. Write truth table for clock transitions. Ans. Three-Bit Binary Rip
Five popular hashing functions are as follows:- Division Method Midsquare Method Folding Method Multiplicative method Digit Analysis
Telephone companies normally provide a voltage of to power telephones? Telephone companies usually give a voltage of to power telephones -48 volts DC.
Blocking and Non-Blocking network In non-blocking networks the route from any free input node to any free output node can always be offered. Crossbar is an best example of non-
INTERRUPT METHOD - USING PORTB CHANGE INTERRUPT By using 4 by 4 matrix keypad connected to PORTA and PORTB. The rows are connected to PORTA-Low (RA1-RA4) and the columns are co
voltage,current and power relation in a delta connection
Determine the hardware for multiplication The hardware for multiplication consists of equipment given in Figure. The multiplier is stored in register and its sign in Q . The se
The current 32 and 64 bit machines can represent integers of around 9 digits and 30 digits respectively, while various scientific and mathematical applications have to represent in
Comparison between risc and cisc - computer architecture: CISC Emphasis on hardware Includes multi-clock complex instructions Memory-to-memory
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd