Explain about quine mckluskey method, Computer Engineering

Assignment Help:

Q. Explain about Quine McKluskey Method?

A tabular method was proposed to deal with increasing number of variables called Quine McKluskey Method. This method is appropriate for programming and therefore provides a tool for automating design in form of minimizing Boolean expression. 

The fundamental standard behind Quine McKluskey Method is to remove terms that are redundant and can be attained by other terms.

To understand Quine - Mc Kluskey method lets see subsequent illustration:-

2078_Explain about Quine McKluskey Method.png

Step I:   Terms of function are placed in table as below:

1172_Explain about Quine McKluskey Method1.png

Step II :   Forming pairs that differ in just one variable also put check (v) against terms selected and finding resultant terms as below :-

862_Explain about Quine McKluskey Method2.png

In the new terms, again find all terms that differ only in one variable as well as put a check (?) across those terms it implies that

370_Explain about Quine McKluskey Method3.png

Step III:   Now, constructing final table as: 

1279_Explain about Quine McKluskey Method4.png

So all columns have mark 'X'. So ultimate expression is: 

F (A,B,C,D,E)  =  ABCE + A¯C DE¯   +  B¯C¯E


Related Discussions:- Explain about quine mckluskey method

Pervasive computing, Explain why pervasive computing can be termed as a “te...

Explain why pervasive computing can be termed as a “technology that disappears”

Explain the do while loops, Explain The do while loops The do while loo...

Explain The do while loops The do while loops is similar, but the test occurs after the loop body is executed. This ensures that the loop body is run at least once.

Explain proces of defining the document page title, Q. Explain proces of de...

Q. Explain proces of defining the Document Page Title? Though the document has a file name, notice it's still labelled Untitled Document; that is because it needs an HTML docum

Linux, Discuss the risks of having a single root user and how more limited ...

Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems

Explain traffic handling capacity, Traffic Handling Capacity is given by ...

Traffic Handling Capacity is given by (A)  Switching capacity × Theoretical maximum load (B)  Switching capacity / Theoretical maximum load (C)  Theoretical maximu

Difference between depth first and breadth first traversing, Explain the di...

Explain the difference between depth first and breadth first traversing techniques of a graph.   Depth-first search is dissimilar from Breadth-first search in the following way

How to copy several files in one stroke, Q. How to copy several files in on...

Q. How to copy several files in one stroke? The COPY command can also be used to copy several files in one stroke by using wildcards. For example, consider the following comman

State of the register, What is the state of the register in Figure  after e...

What is the state of the register in Figure  after every clock pulse if it begins in the 101001111000 state?

Computers, Purpose: Front line client service. Make bookings for vehicle se...

Purpose: Front line client service. Make bookings for vehicle servicing, accesses client database, prints invoices for clients etc. The mechanics complete worksheets for the variou

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd