Simplify the expression by using karnaugh map, Computer Engineering

Assignment Help:

Simplify   the   following   expression   into   sum   of   products   using   Karnaugh   map

F(A, B, C, D) = ∑ (1,3,4,5,6,7,9,12,13)

Ans. Simplification of the given expression in sum of products using Karnaugh Map is shown below:

F(A,B,C,D) = Σ (1,3,4,5,6,7,9,12,13)

Karnaugh Map for F(A,B,C,D) = Σ (1,3,4,5,6,7,9,12,13) is demonstrated in figure (a). In this figure the grouping of cells is also shown.

819_Simplify   the   expression   into   sum   of   products   using   Karnaugh   map.png

So the equations for (1) is A‾ B; and for (2) is C‾ D; for (3) is A‾ D; for (4) is B C‾

Thus, the Simplified Expression for the Karnaugh map as
F(A,B,C,D) = A‾ B+ C‾ D+ A‾ D+B C‾
= A‾ (B + D) + C‾ ( B + D)

 

 


Related Discussions:- Simplify the expression by using karnaugh map

Determine the fastest logic, Which of the fastest logic: TTL, ECL, CMOS and...

Which of the fastest logic: TTL, ECL, CMOS and LSI ? Ans. The fastest logic family of all logic families ECL. High  speeds  are  possible  in  ECL  since the  transistors  a

Explain about the data logging, Data logging  This technique involves ...

Data logging  This technique involves collecting data automatically using sensors; frequently used when doing scientific experiments or monitoring a system.

We cannot use append structures why, If a table that is to be extended cont...

If a table that is to be extended contains a long field, we cannot use append structures why? Long fields in a table must always be located in the last, as the last field of th

How control functions help in signalling and control, How different control...

How different control function categories help in signalling and control. Events happening outside the exchange on the line units, trunk junctions and inter exchange signalin

Name the popular security measures, Name the popular security measures ...

Name the popular security measures A number of security products covering a broad range of methods are available in the market. Most popular of all the security measures are th

Types of e-commerce , Types E-commerce generally based on advertising, sell...

Types E-commerce generally based on advertising, selling, marketing and buying, but due to the differences in needs, e-commerce has been classified according to the parties of the

What is link destruction, What is link destruction? Link destruction is...

What is link destruction? Link destruction is inverse of link creation. When a link is destroyed makes sure the associated objects accessible by other handles or intentionally

Inherent addressing, Inherent addressing   Here the address is already b...

Inherent addressing   Here the address is already built in to the instruction i.e. inherent to the code     ABA  ; Add A to B and store the answer in A  Simple programs using

Explain cpu based exchange, Explain CPU based exchange. CPU Based Exch...

Explain CPU based exchange. CPU Based Exchange: All the control equipment is replaced with a single processor that must be quite powerful, in centralized control. This should

What is dispatch unit, What is dispatch unit? A separate unit which we ...

What is dispatch unit? A separate unit which we call the dispatch unit fetch instructions from the front of the queue and sends them to the execution unit. The dispatch unit al

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd