Design a BCD to excess 3 code converter using NAND gates, Computer Engineering

Assignment Help:

Design a BCD to excess 3 code converter using minimum number of NAND gates.

Hint: use k map techniques.

Ans. Firstly we make the truth table:

BCD no

A B C D

EXCESS-3 NO

W X Y Z

0 0 0 0

0 0 1 1

0 0 0 1

0 1 0 0

0 0 1 0

0 1 0 1

0 0 1 1

0 1 1 0

0 1 0 0

0 1 1 1

0 1 0 1

1 0 0 0

0 1 1 0

1 0 0 1

0 1 1 1

1 0 1 0

1 0 0 0

1 0 1 1

1 0 0 1

1 1 0 0

After that by using K maps we can get simplified functions for w, x, y, z shown below as:

363_Design a BCD to excess 3 code converter using NAND gates.png

                                                 NAND gate implementation for simplified function

W = BD + AD + AB' + BC
Through complementing twice we find
W = ((BD + AD + AB' + BC)')'

= ((BD)' . (AD)' . (AB')' . (BC)')' X = BC'D + B'D + B'C

Through complementing twice we find
X = BC'D + B'D + B'C

= ((BC'D)' . (B'D)' . (B'C)')'

Y = C'D' + CD

= ((C'D')' + (CD)')'

Z = D'

2241_Design a BCD to excess 3 code converter using NAND gates12.png

Logic diagram for BCD to excess 3 code converter using minimum number of NAND gates


Related Discussions:- Design a BCD to excess 3 code converter using NAND gates

Receive a message, Receive a message. tid is integer task identifier of tra...

Receive a message. tid is integer task identifier of transmitting process supplied by user and msgtag is message tag supplied by user( must be non negative integer). The process re

Evaluation stack architecture, Q. Evaluation Stack Architecture? A stac...

Q. Evaluation Stack Architecture? A stack is a data structure which implements Last-In-First-Out (LIFO) access policy. You can add an entry to the with a PUSH(value) as well as

Defined for a push button fields in the screen attributes, What is to be de...

What is to be defined for a push button fields in the screen attributes? A function code has to be described in the screen attributes for the push buttons in a screen.

By which transport protocol used, The transport protocol used by TFTP (Triv...

The transport protocol used by TFTP (Trivial File Transfer Protocol) is? The transport protocol used through Trivial File Transfer Protocol is UDP.

Structural classification-flynns classification , Structural Classification...

Structural Classification Flynn's classification examine the behavioural concept and does not receive into consideration the computer's structure. Parallel computers can be cla

Various threats posed by server in client server environment, Explain vario...

Explain various threats posed through servers into a client server environment. Server Destroyed within an Accident: Power failures, Leaking pipes and equipment failures are no

Define the term ''turn-around'', The "turn-around" time of a user job is th...

The "turn-around" time of a user job is the? Ans. Total time taken to execute the job is called "turn around" time.

What is stack addressing, Q. What is Stack Addressing? In this addressi...

Q. What is Stack Addressing? In this addressing technique operand is implied as top of stack. It isn't explicit however implied. It employs a CPU Register known as Stack Pointe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd