Explain about quine mckluskey method, Computer Engineering

Assignment Help:

Q. Explain about Quine McKluskey Method?

A tabular method was proposed to deal with increasing number of variables called Quine McKluskey Method. This method is appropriate for programming and therefore provides a tool for automating design in form of minimizing Boolean expression. 

The fundamental standard behind Quine McKluskey Method is to remove terms that are redundant and can be attained by other terms.

To understand Quine - Mc Kluskey method lets see subsequent illustration:-

2078_Explain about Quine McKluskey Method.png

Step I:   Terms of function are placed in table as below:

1172_Explain about Quine McKluskey Method1.png

Step II :   Forming pairs that differ in just one variable also put check (v) against terms selected and finding resultant terms as below :-

862_Explain about Quine McKluskey Method2.png

In the new terms, again find all terms that differ only in one variable as well as put a check (?) across those terms it implies that

370_Explain about Quine McKluskey Method3.png

Step III:   Now, constructing final table as: 

1279_Explain about Quine McKluskey Method4.png

So all columns have mark 'X'. So ultimate expression is: 

F (A,B,C,D,E)  =  ABCE + A¯C DE¯   +  B¯C¯E


Related Discussions:- Explain about quine mckluskey method

How does computer know whether arriving frame has ARP msg, How does a compu...

How does a computer know whether an arriving frame contains an ARP message? Explain. The type field into the frame header gives that the frame contains an ARP message. A sender

Over fitting considerations - artificial intelligence, Over fitting Conside...

Over fitting Considerations - artificial intelligence Left  unexamined ,  back  propagation  in  multi-layer  networks  may  be very susceptible  to over fitting itself to the

Database management system, Consider the following instance of the Students...

Consider the following instance of the Students relation, sorted by gpa. sid name login age gpa 53831 Madayan madayan@music 11 1.8 53832 Guldu guldu@music 12 2.0 53688 Smith smith

Main memory location, Poor Richard's cache as explained in Conference Topic...

Poor Richard's cache as explained in Conference Topic 2. Suppose that a 7th word (gggg gggg) from main memory location 011110 is read and stored in cache. a) Determine the cach

Programming, Write a procedure for each of the following: (i) To find the m...

Write a procedure for each of the following: (i) To find the maximum MAX of the values in the list. (ii) To find the average MEAN of the values in the list. (iii) To find the produ

Determine the concepts of object oriented analysis, Determine the concepts ...

Determine the concepts of Object Oriented Analysis  In OOA the initial focus is on identifying objects from the application domain, after that fitting those procedures around

Matlab, Use the colon operation to create a vector x of numbers -10 through...

Use the colon operation to create a vector x of numbers -10 through 10 in steps of 1. Use matrix operations to create a vector y where each element is 5 more than 2 times the corre

Security features used in client-server types of network, Security features...

Security features used in Client-Server types of network are as follows :  i) Digital Signatures ii)  Encryption / Decryption iii) Secure Socket Layer (SSL) iv) Firewa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd