Explain the working of bcd adder, Computer Engineering

Assignment Help:

Explain the working of BCD adder

One of the ways of adding decimal numbers in BCD is to use a 4-bit binary adder and perform arithmetic operation one digit at a time. The low-order pair of the BCD digits is first added to generate a binary sum if result is equal or greater than 1010, it is corrected by adding 0110 to the binary sum. The second operation produces an output- carry for the next pair of important digits. The next higher-order pair of digits, jointly with input-carry, is then added to produce their binary sum. If result is equal to or greater than 1010, it can corrected by adding 0110. The procedure is repeated until all the decimal digits are added.

The logic circuit which detects necessary correction can be derived from table entries. It is clear that a correction is needed when binary sum has an output carry K = 1. The other six combinations from 1010 to 1111 which need a correction have a 1 in position Z . To distinguish them from binary 1000 and 1001 that also have a8 1 in position Z , we specify further that either Z  or Z  must have the1. The condition for8 4 2 correction and an output-carry could be expressed by Boolean function

C = K + Z  Z  + Z  Z8 4 8 2

When C = 1, we require to add 0110 to binary sum and provide an output-carry for next stage.

BCD adder is circuit which adds two BCD digits in parallel and generates sum digit also in BCD. BCD adder must include correction logic in its internal construction

 

934_bcd adder.png


Related Discussions:- Explain the working of bcd adder

What are the general security issues, What are the General Security Issues ...

What are the General Security Issues Many issues exist when linking a computer system to the Internet or indeed to an external link via a network set up. There are numerous way

Determine about the security methods, Determine about the Security methods ...

Determine about the Security methods Security methods also protect information from accidental or intentional modification, manipulation or destruction. Most security experts o

Determine the method for updating the main memory, The method for updating ...

The method for updating the main memory as soon as a word is removed from the Cache is known as  (A) Write-through                  (B) write-back   (C) protected write

What is server in sap terminology, What is Server in SAP terminology? ...

What is Server in SAP terminology? A component can having of one process or a group and is then known as the server for the respective service.

Difference between next and continue clause, The difference among the next ...

The difference among the next and continue verb is that in the continue verb it is used for a situation where there is no EOF condition that is the records are to be accessed again

Print a prompt, When your shell is waiting for input from the user, it shou...

When your shell is waiting for input from the user, it should first print a prompt. The prompt should consist of the current working directory followed by the _>_ character. Here i

What is smtp, SMTP is a Protocol used for transferring message among en...

SMTP is a Protocol used for transferring message among end user & Mail Server.

What is the future in mq if i have 2+exp, It speeds execution of distribute...

It speeds execution of distributed applications. It runs on dissimilar platforms. It time independent. No loss for msg delivery i.e. guarantee delivery.

Define synchronization latency problem, Q. Define Synchronization Latency P...

Q. Define Synchronization Latency Problem? If two simultaneous processes are executing remote loading then it's not recognized by what time two processes will load as issuing p

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd