Implementation of logic micro-operations, Computer Engineering

Q. Implementation of Logic Micro-operations?

For implementationlet's first ask questions how many logic operations can be performed with two binary variables. We can have 4 possible combinations of input of two variables. These are 00, 01, 10, and 11. Now for eachof these 4 input combinations we can have 24 = 16 output combinations of truthvalues for a specific function. This suggests that for two variables we can have 16 logical operations. Above stated fact would be clearer by going through the given figure.

1311_Implementation of Logic Micro-operations.png

Figure: Logic micro-operations on two inputs

Please consider that in figure above micro-operations are derived by replacing x and y of Boolean function with registers R1 and R2 on every corresponding bit of registers R1 and R2. Every one of these bits will be treated just like binary variables. 

In various computers only four: AND, OR, XOR (exclusive OR) and complement micro-operations are implemented. Other 12 micro-operations can be derivedfrom these four micro-operations. Figure belowdisplays one bit that is the ith bit stage of four logic operations. Please consider that circuit comprises 4 gates and a 4 × 1 MUX. The ith bits of Register R1 and R2 are passed through circuit. On the base of selection inputs S0 and S1 desired micro-operation is attained.

1733_Implementation of Logic Micro-operations1.png

Figure: Logic diagram of one stage of logic circuit

Posted Date: 7/27/2013 3:42:27 AM | Location : United States







Related Discussions:- Implementation of logic micro-operations, Assignment Help, Ask Question on Implementation of logic micro-operations, Get Answer, Expert's Help, Implementation of logic micro-operations Discussions

Write discussion on Implementation of logic micro-operations
Your posts are moderated
Related Questions

The Gantt chart shows the several activities of each processor with respect to progress in time in idle-overhead -busy modes with respect to each processor. Kiviat diagram:  Th

Summary of Tasks The Task Summary tries to shows the amount of duration each task has spent starting from initialization of the task till its completion on any processor as d

First Order Predicate Logic This is a more expressive logic because it builds on propositional logic by allowing us to use constants, predicates, variables, quantifiers and fun

a. Explain the hardware mechanism for handling multiple interrupt requests. b. What are handshaking signals? Describe the handshake control of data transfer during input and out

what is java?

As per Nyquist criterion the sampling rate is (A) 2fs                                                  (B) (1/2)fs (C) (1/2fs)

Set up the minunit test framework examples in your environment (i.e. build or compile the code). Once you can run the example, use the minunit test framework to create and run a bo

There are two different parts of applets. Trusted Applets and Untrusted applets. Trusted Applets are applets with predefined security and Untrusted Applets are applets without any

Signaling - Universal Serial Bus: USB supports following signaling rates: o   A low speed rate of 1.5 Mbit/s is defined by USB 1.0. This is so much similar to "full speed"