Browse Prior Art Database

Scanning Technique Utilizing Matrix

IP.com Disclosure Number: IPCOM000075396D
Original Publication Date: 1971-Sep-01
Included in the Prior Art Database: 2005-Feb-24
Document File: 2 page(s) / 42K

Publishing Venue

IBM

Related People

Luxton, RH: AUTHOR

Abstract

A method is provided for scanning a source control card for syntactical correctness, and consists of building a matrix table with a row index for the type of character scanned and a column index for indicating the column position to be used. Each matrix position contains two information items. One item is an index to a subroutine and the other item is the column position to be used for the next character scanned. The source control card statement is: KEYWD1-ARG1, KEYWD2-ARG2.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 56% of the total text.

Page 1 of 2

Scanning Technique Utilizing Matrix

A method is provided for scanning a source control card for syntactical correctness, and consists of building a matrix table with a row index for the type of character scanned and a column index for indicating the column position to be used. Each matrix position contains two information items. One item is an index to a subroutine and the other item is the column position to be used for the next character scanned. The source control card statement is: KEYWD1-ARG1, KEYWD2-ARG2.

Assume that the scan starts at Point A. At this point, a blank is encountered. The table is entered at the "blank" row and column 1. The entry position states "use subroutine A and stay in column 1". Subroutine A increments the scan pointer and returns to the table.

This operation continues for successive blanks until point B is reached. The character K is classified as "other" and the table entry position at "other" and column 1 is subroutine B and column 2. Subroutine B performs a length count for the keyword, returns to subroutine A which advances the scan pointer and returns to the table. Assuming that the keyword has no commas, blanks or dashes, then the table is again entered at row "other" and column 2. The entry position states "use subroutine B and stay in column 2". Eventually point C is reached. The table is then entered at row "dash" and column 2. The entry position states "use subroutine C and go to column 3 for next entry". Subroutine C is pe...