Design a BCD to excess 3 code converter using NAND gates, Computer Engineering

Assignment Help:

Design a BCD to excess 3 code converter using minimum number of NAND gates.

Hint: use k map techniques.

Ans. Firstly we make the truth table:

BCD no

A B C D

EXCESS-3 NO

W X Y Z

0 0 0 0

0 0 1 1

0 0 0 1

0 1 0 0

0 0 1 0

0 1 0 1

0 0 1 1

0 1 1 0

0 1 0 0

0 1 1 1

0 1 0 1

1 0 0 0

0 1 1 0

1 0 0 1

0 1 1 1

1 0 1 0

1 0 0 0

1 0 1 1

1 0 0 1

1 1 0 0

After that by using K maps we can get simplified functions for w, x, y, z shown below as:

363_Design a BCD to excess 3 code converter using NAND gates.png

                                                 NAND gate implementation for simplified function

W = BD + AD + AB' + BC
Through complementing twice we find
W = ((BD + AD + AB' + BC)')'

= ((BD)' . (AD)' . (AB')' . (BC)')' X = BC'D + B'D + B'C

Through complementing twice we find
X = BC'D + B'D + B'C

= ((BC'D)' . (B'D)' . (B'C)')'

Y = C'D' + CD

= ((C'D')' + (CD)')'

Z = D'

2241_Design a BCD to excess 3 code converter using NAND gates12.png

Logic diagram for BCD to excess 3 code converter using minimum number of NAND gates


Related Discussions:- Design a BCD to excess 3 code converter using NAND gates

What is collation, What is Collation Collation refers to a set of rules...

What is Collation Collation refers to a set of rules that verify how data is sorted and compared. Character data is sorted using rules that explain  the correct character se

Bidirectional search, Bidirectional Search: We've concentrated so far ...

Bidirectional Search: We've concentrated so far on the searches where the point of view for the search is to find a solution, but not the path to the solution. Like any other

Ease of learning - user friendliness, Ease of Learning - User Friendliness ...

Ease of Learning - User Friendliness Much has been made recently of increasing sophistication in technology with one of the major benefits advertised as an increase in somethi

How is secure sockets layer relied on the certificates, How is Secure Socke...

How is Secure Sockets Layer relied on the certificates? The Secure Sockets Layer standard is not a single protocol, but quite a set of accepted data transfer routines which a

Define process for swapping into memory from the swap device, What are the ...

What are the criteria for choosing a process for swapping into memory from the swap device? The resident time of the processes in the change device, the priority of the process

Cobol coding, What is cobol codin for heap sort?

What is cobol codin for heap sort?

What all 1's represents in 32bit ip addressing scheme, In 32bit IP Addressi...

In 32bit IP Addressing scheme all 1's represent? All 1's represent limited broadcast in 32 bit IP Addressing scheme.

Ms access database to a present conversion, I have converted my MS Access d...

I have converted my MS Access database to a present conversion. I am getting conversion errors? Ans) Design specs have changed in new releases of MS Access. Visit the on-line

State the concept of hierarchy in object oriented, Hierarchy Hierarchy...

Hierarchy Hierarchy is a process of ranking or ordering of abstraction. Hierarchy is decided by the help of 'divide and conquer' principle. Complex objects can be described

Explain the type of micro-operations, Q. Explain the type of micro-operatio...

Q. Explain the type of micro-operations? Let's first discuss type of micro-operations. Most common micro-operations performed in a digital computer can be categorized into 4 ca

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd