Steps uesd in quine mckluskey method, Computer Engineering

Assignment Help:

Q. Steps uesd in quine mckluskey method?

Step I:

Build a table in that every term of expression is represented in row (Expression must be in SOP form). Terms can be expressed in 0 (Complemented) or 1 (normal) form.

Step II:

Check all terms which differ in just one variable and then combine pairs by removing variable which differs in those terms. So a new table is formed. This process is repeated if necessary in new table also till all uncommon terms are left it implies that no matches left in table.

Step III:

a) Ultimately a two dimensional table is formed all terms that aren't removed in table form rows and all original terms form the column.

b) At every intersection of row and column where row term is subset of column term a 'X' is placed.

Step IV:

a) Put a square around every 'X' that is alone in column

b) Put a circle around every 'X' in any row that comprises a squared  'X'

c) If each column has a squared or circled 'X' then process is finished and respective minimal expression is formed by all row terms that have marked Xs.


Related Discussions:- Steps uesd in quine mckluskey method

Find out lowest propagation delay time in logic family, Which the digital l...

Which the digital logic family has the lowest propagation delay time ? Ans. ECL is the digital logic family that has the lowest propagation delay time. In ECL lowest propagati

What is the advantage of running the vuser as thread, VuGen gives the facil...

VuGen gives the facility to use multithreading. This enables more Vusers to be run pergenerator. If the Vuser is run as a process, the similar driver program is loaded into memory

Parallel computing, explain different types of parallel processing mechani...

explain different types of parallel processing mechanism

Describe the fundamental characteristics of antennas, Question 1: (a) ...

Question 1: (a) Describe the two fundamental characteristics of antennas explaining in detail how it affects the security of wireless networks. (b) What is a wireless cli

Determine the nand gate, If  the input to T-flipflop is 100 Hz signal, the ...

If  the input to T-flipflop is 100 Hz signal, the final output of the three T-flipflops in cascade is ? Ans. The  final  output  of  the  three  T-flip-flops in cascade is 12

What is the significance of the screen number ''0'', What is the significan...

What is the significance of the screen number '0'? In "calling mode", the special screen number 0 (LEAVE TO SCREEN 0) causes the system to jump back to the last call level.  Th

What are the aspects of security policy, What are the aspects of security p...

What are the aspects of security policy The security policy should cover aspects such as network service access, physical access, limits of acceptable behaviour, company's pro

What is mmx technology, What is MMX Technology MMX Technology: MMX (M...

What is MMX Technology MMX Technology: MMX (Multimedia extensions) technology adds 57 new instructions to instruction set of Pentium - 4 microprocessors. MMX technology also

Translation table encryption technique to secure transaction, Discuss about...

Discuss about Translation table encryption technique to ensure secured transactions onto the net? Translation table: In this process each chunk of data is used like an of

Write decoder functionality in only one statement in verilog, Write decoder...

Write decoder functionality in only one statement in verilog module decoder( // Outputs dout, // Inputs din ); input [3:0] din; output [15:0] dout;

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd