Independent loops statement, Computer Networking

Assignment Help:

INDEPENDENT Loops

HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done independently---that is, in any order or concurrently---without affecting the result . In effect, this directive changes a do-loop from an implicitly parallel construct to an explicitly parallel construct.

 The INDEPENDENT directive must instantaneously precede the do-loop to which it applies. In its easiest form, it has no additional argument and asserts simply that no iteration of the do-loop can affect any other iteration.

Example 9

In the following code fragment, the directives indicate that the outer two loops are independent. The inner loop assigns the elements of A repeatedly and hence it is not independent.

!HPF$   INDEPENDENT

do i=1,n1  ! Loop over i independent

!HPF$   INDEPENDENT

do j=1,n2      ! Loop over j independent

do k=1,n3          ! Inner loop not independent

A(i,j) = A(i,j) + B(i,j,k)*C(i,j)

enddo enddo

enddo


Related Discussions:- Independent loops statement

Subnetting, Calculate the Network Address, the broadcast address and the ho...

Calculate the Network Address, the broadcast address and the host range, for the following host address i. 192.168.180.94/27 ii. 172.23.8.19 /21 iii. 147.252.238.20 255.255.240.0 b

What is mesh network, What is mesh network? A network in which there ar...

What is mesh network? A network in which there are many network links among computers to provide multiple paths for data to travel.

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

What are the key differences between gsm and gprs networks, Question : ...

Question : a) Describe the following core components of a cellular based network: i) Cell ii) MSC iii) HLR & VLR iv) PSTN b) Explain why frequency reuse is consi

Show the ip address representation, Q. Show the IP Address Representation? ...

Q. Show the IP Address Representation? IP Addressing IP Address Representation Binary notation - IP address is displayed as 32 bits Dotted-decimal notation -

Network management assignment, One of the key roles of a System/Network Adm...

One of the key roles of a System/Network Administrator is to monitor log files. This usually requires helper scripts (i.e. Perl programs) so a summary of large log files can be qui

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd