Explain about quine mckluskey method, Computer Engineering

Assignment Help:

Q. Explain about Quine McKluskey Method?

A tabular method was proposed to deal with increasing number of variables called Quine McKluskey Method. This method is appropriate for programming and therefore provides a tool for automating design in form of minimizing Boolean expression. 

The fundamental standard behind Quine McKluskey Method is to remove terms that are redundant and can be attained by other terms.

To understand Quine - Mc Kluskey method lets see subsequent illustration:-

2078_Explain about Quine McKluskey Method.png

Step I:   Terms of function are placed in table as below:

1172_Explain about Quine McKluskey Method1.png

Step II :   Forming pairs that differ in just one variable also put check (v) against terms selected and finding resultant terms as below :-

862_Explain about Quine McKluskey Method2.png

In the new terms, again find all terms that differ only in one variable as well as put a check (?) across those terms it implies that

370_Explain about Quine McKluskey Method3.png

Step III:   Now, constructing final table as: 

1279_Explain about Quine McKluskey Method4.png

So all columns have mark 'X'. So ultimate expression is: 

F (A,B,C,D,E)  =  ABCE + A¯C DE¯   +  B¯C¯E


Related Discussions:- Explain about quine mckluskey method

What is a breeder reactor, Q. What is a breeder reactor? 92 U 238 and...

Q. What is a breeder reactor? 92 U 238 and 90 Th 232 aren't fissile materials but are abundant in nature. In the reactor these are able to be converted into a fissile mater

What is machine.config, What is Machine.config?  Machine configuration ...

What is Machine.config?  Machine configuration file: The machine. config file contains settings that apply to the whole computer.  The machine.config, which can be found in the

Show the ranges of port numbers, Q. Show the ranges of Port numbers? P...

Q. Show the ranges of Port numbers? Port numbers are divided into three ranges: Well-known ports are those from 0 through 1,023. Registered ports are those from

Dbms, types of lock

types of lock

COMPUTER SYSTEM, Classify computer systems according to capacity. How they ...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

Secondary storage - computer architecture, Secondary storage: Secondar...

Secondary storage: Secondary storage (or external memory) differs from primary storage in that aspect it is not accessible by the CPU directly. The computer typically uses its

What is the pcm pulse or symbol transmission rate, An analog information si...

An analog information signal, whose maximum frequency is 6000Hz, is to be transmitted using a PCM system. The quantization error must not exceed the ±1 % of the peak-topeak analog

Non repudiation, What is non-repudiation? how can it be achieved in designi...

What is non-repudiation? how can it be achieved in designing e-cash based system?

How to use activex control in .net, How to use ActiveX Control in .Net ? ...

How to use ActiveX Control in .Net ? ActiveX control is a special type of COM component that handles a User Interface. Using ActiveX Control in your .Net Project is even simple

Priority interrupt and synchronous bus, What is a Priority Interrupt? A...

What is a Priority Interrupt? Ans: A priority interrupt is a type of interrupt that establishes a priority over the many sources to determine which condition is to be serviced

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd