Explain about quine mckluskey method, Computer Engineering

Assignment Help:

Q. Explain about Quine McKluskey Method?

A tabular method was proposed to deal with increasing number of variables called Quine McKluskey Method. This method is appropriate for programming and therefore provides a tool for automating design in form of minimizing Boolean expression. 

The fundamental standard behind Quine McKluskey Method is to remove terms that are redundant and can be attained by other terms.

To understand Quine - Mc Kluskey method lets see subsequent illustration:-

2078_Explain about Quine McKluskey Method.png

Step I:   Terms of function are placed in table as below:

1172_Explain about Quine McKluskey Method1.png

Step II :   Forming pairs that differ in just one variable also put check (v) against terms selected and finding resultant terms as below :-

862_Explain about Quine McKluskey Method2.png

In the new terms, again find all terms that differ only in one variable as well as put a check (?) across those terms it implies that

370_Explain about Quine McKluskey Method3.png

Step III:   Now, constructing final table as: 

1279_Explain about Quine McKluskey Method4.png

So all columns have mark 'X'. So ultimate expression is: 

F (A,B,C,D,E)  =  ABCE + A¯C DE¯   +  B¯C¯E


Related Discussions:- Explain about quine mckluskey method

Breifly explain memory-to-memory architecture, Memory-to-Memory Architectur...

Memory-to-Memory Architecture The pipelines can access vector operands intermediate and final results straight in main memory. This necessitates the higher memory bandwidth. Fu

write a ''c'' program to accept any 3 digit integer number, Write a 'C' pr...

Write a 'C' program to accept any 3 digit integer number from the keyboard and display the word equivalent representation of the given number

Explain direct memory access, Explain Direct Memory Access. A modest en...

Explain Direct Memory Access. A modest enhances in hardware enables an IO device to transfer a block of information to or from memory without CPU intervention. This task needs

Different types of layers in tcp/ip protocol stack, What are the different ...

What are the different types of layers in TCP/IP protocol stack? Layers into the TCP/IP protocol architecture are as given below: • Application Layer, • Host-to-Host Tra

What is public key cryptography, What is Public Key Cryptography Publi...

What is Public Key Cryptography Public-key cryptography is a form of modern cryptography which permits users to communicate safely without lastly agreeing on a shared secret

Breadth first search, Breadth First Search: Given a set of operators o...

Breadth First Search: Given a set of operators o1, ..., on in a breadth first search, every time a new state is reached, an action for each operator on  s  is added to the bot

What is telex, Telex is a (A)  Telephone Service between various subsc...

Telex is a (A)  Telephone Service between various subscribers (B)  Tele printer Service between various subscribers (C)  Television Service between various subscri

Explain potential of parallelism, Potential of Parallelism Problems in ...

Potential of Parallelism Problems in the actual world differ in respect of the amount of inherent parallelism intrinsic in respective problem domain. Some problems can be easil

What is a multitape tm, What is a multitape TM?  A  multi-tape  Turing ...

What is a multitape TM?  A  multi-tape  Turing  machine  having  of  a  finite  control  with  k-tape  heads  and k-tapes each tape is infinite in both directions. On a one mov

What is double entry - verification, What is Double entry - Verification ...

What is Double entry - Verification In this approach, data is entered twice (using two different people); data is only accepted if both versions match up. Generally used to ve

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd