Steps uesd in quine mckluskey method, Computer Engineering

Assignment Help:

Q. Steps uesd in quine mckluskey method?

Step I:

Build a table in that every term of expression is represented in row (Expression must be in SOP form). Terms can be expressed in 0 (Complemented) or 1 (normal) form.

Step II:

Check all terms which differ in just one variable and then combine pairs by removing variable which differs in those terms. So a new table is formed. This process is repeated if necessary in new table also till all uncommon terms are left it implies that no matches left in table.

Step III:

a) Ultimately a two dimensional table is formed all terms that aren't removed in table form rows and all original terms form the column.

b) At every intersection of row and column where row term is subset of column term a 'X' is placed.

Step IV:

a) Put a square around every 'X' that is alone in column

b) Put a circle around every 'X' in any row that comprises a squared  'X'

c) If each column has a squared or circled 'X' then process is finished and respective minimal expression is formed by all row terms that have marked Xs.


Related Discussions:- Steps uesd in quine mckluskey method

Define constraints, Define Constraints Constraints can be defined as P...

Define Constraints Constraints can be defined as Preconditions (input values) and Post Conditions (output values). Preconditions on functions are constraints which input value

How adaptive transmission helps tcp to maximize connection, How adaptive tr...

How adaptive transmission helps TCP to maximize throughput on each connection? To know how adaptive retransmission helps TCP maximize throughput upon all connection, see a case

VLSI implementation of control unit, Q. VLSI Implementation of Control Unit...

Q. VLSI Implementation of Control Unit? A main potential advantage of RISC is VLSI implementation of microprocessor. VLSI Technology has decreased the delays of transfer of inf

Advantages offered by data mining, Advantages offered by Data Mining: 1...

Advantages offered by Data Mining: 1.  Facilitates discovery of knowledge from big, massive data sets. 2.  Can be used within dissimilar application areas by Fraud detection

Find cross points and primary no. in 3-tage satge switching, A three stage ...

A three stage switching structure supports 100 inlets and 400 outlets. Find the number of cross points, and the number of primary and secondary switches used in the design. We

Embedded, explain djnz instruction of intel 8051 microcontroler

explain djnz instruction of intel 8051 microcontroler

What is edi (electronic data interchange), What is EDI (Electronic Data Int...

What is EDI (Electronic Data Interchange)? EDI: Electronic Data Interchange (EDI) is used by organizations for transactions that happen on regular basis to a pre-determined for

Effective branching rate - heuristic searches, Effective Branching Rate: ...

Effective Branching Rate: Assessing heuristic functions is an important part of "AI" research: a particular heuristic function may sound such a good idea, but in practice give

Explain the concept of thread, The Concept of Thread A thread is a sequ...

The Concept of Thread A thread is a sequential flow of control within a process. A process is able to have one or more threads. Threads have their own register-values and progr

What is virtual memory, Virtual Memory is a way of extending a computer's m...

Virtual Memory is a way of extending a computer's memory by using a disk file to replicate add'l memory space. The OS remain track of these add'l memory addresses on the hard disk

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd