Explain about quine mckluskey method, Computer Engineering

Assignment Help:

Q. Explain about Quine McKluskey Method?

A tabular method was proposed to deal with increasing number of variables called Quine McKluskey Method. This method is appropriate for programming and therefore provides a tool for automating design in form of minimizing Boolean expression. 

The fundamental standard behind Quine McKluskey Method is to remove terms that are redundant and can be attained by other terms.

To understand Quine - Mc Kluskey method lets see subsequent illustration:-

2078_Explain about Quine McKluskey Method.png

Step I:   Terms of function are placed in table as below:

1172_Explain about Quine McKluskey Method1.png

Step II :   Forming pairs that differ in just one variable also put check (v) against terms selected and finding resultant terms as below :-

862_Explain about Quine McKluskey Method2.png

In the new terms, again find all terms that differ only in one variable as well as put a check (?) across those terms it implies that

370_Explain about Quine McKluskey Method3.png

Step III:   Now, constructing final table as: 

1279_Explain about Quine McKluskey Method4.png

So all columns have mark 'X'. So ultimate expression is: 

F (A,B,C,D,E)  =  ABCE + A¯C DE¯   +  B¯C¯E


Related Discussions:- Explain about quine mckluskey method

Write a subroutine in c for toggling the cursor, Write a subroutine in C fo...

Write a subroutine in C for toggling the cursor using old directives. ; ; use small memory model for C - near code segment _DATA SEGMENT WORD   'DATA'   CURVAL EQU   [B

What do you mean by shopping bots, Q. What do you mean by shopping bots? ...

Q. What do you mean by shopping bots? ANSWER: A shopping bot or buyer agent is an intelligent agent on a Web site that assists you, the customer, search the products and servic

Use of parallel construct with private clause, Q. Use of parallel construct...

Q. Use of parallel construct with private clause? In this example we would see use of parallel construct with private and firstprivate clauses. At end of program i and j remain

The major underlying concepts of object orientation, Objects, messages, cla...

Objects, messages, class, inheritance and polymorphism are the major concepts of object orientation.

Which types of software programs are usually supported, Which types of soft...

Which types of software programs are usually supported? Our organization is unique in that we are very flexible and can meet most client requires relative to the integration of

Assembly directives and pseudo-ops, Assembly directives and pseudo-ops: ...

Assembly directives and pseudo-ops: Assembly directives are which instructions that executed by the assembler at assembly time, not by the CPU at run time. They can build the

Convert ascii code to its bcd equivalent, Convert ASCII code to its BCD equ...

Convert ASCII code to its BCD equivalent. This can be achieved by simply replacing bits in upper four bits of byte by four zeros. For illustration the ASCII '1' is 32h = 0010B. By

A subroutine can contain nested form and endform blocks, A subroutine can c...

A subroutine can contain nested form and endform blocks. False.

Masters and slaves, The devices on the I2C bus are either masters or slaves...

The devices on the I2C bus are either masters or slaves. The master is the device that is responsible for driving the SCL clock line, while the slaves are the devices that respond

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd