“…This is followed by a substitution phase whereby a different pattern is substituted in all the locations where the search pattern is found. SSL has been applied to a wide range of applications including digital logic and arithmetic operations, 4,5 signal and image processing, 6 -7 symbolic computing, 8,9 massively parallel computing, 10 implementation of artificial intelligence languages such as PROLOG, 11 and implementation of optical random access memory. 12 In all the implementations that have been reported for SSL thus far, the input operands are assumed to be placed vertically on top of each other so that the operands occupy distinct locations on the input plane.…”