MHB Dealing with 5 input variable Kmaps

  • Thread starter Thread starter shamieh
  • Start date Start date
  • Tags Tags
    Input Variable
AI Thread Summary
The discussion focuses on verifying a 5-input Karnaugh map (K-map) for the function f(V, W, Z, Y, X) and determining the minimal Sum of Products (SOP) equation. The K-map is organized with WX as the top column variables and YZ as the horizontal row variables. The user presents two K-map configurations, one for v = 0 and another for v = 1, detailing the outputs for each combination of inputs. The proposed minimal SOP equation is vzw + zw\bar{x} + \bar{v}\bar{y}z\bar{w}. The user seeks confirmation on the accuracy of their work.
shamieh
Messages
538
Reaction score
0
Just need someone to check my work. Thank you for your time. First time doing a 5 input Kmap.

Determine the following 5 input Karnaugh map for function f(V,W,Z,Y,Z) determine the minimal SOP equation. NOTE: (WX are the variables associated with the top column, and YZ are the variables associated with the other column horizontally.)

[TABLE="class: grid, width: 250"]
[TR]
[TD]YZ|WX
[/TD]
[TD]00
[/TD]
[TD]01
[/TD]
[TD]11
[/TD]
[TD]10
[/TD]
[/TR]
[TR]
[TD]00
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[/TR]
[TR]
[TD]01
[/TD]
[TD]1
[/TD]
[TD]1
[/TD]
[TD]0
[/TD]
[TD]1
[/TD]
[/TR]
[TR]
[TD]11
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]1
[/TD]
[/TR]
[TR]
[TD]10
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[/TR]
[/TABLE]
v = 0

[TABLE="class: grid, width: 250"]
[TR]
[TD]YZ|WX
[/TD]
[TD]00
[/TD]
[TD]01
[/TD]
[TD]11
[/TD]
[TD]10
[/TD]
[/TR]
[TR]
[TD]00
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[/TR]
[TR]
[TD]01
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]1
[/TD]
[TD]1
[/TD]
[/TR]
[TR]
[TD]11
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]1
[/TD]
[TD]1
[/TD]
[/TR]
[TR]
[TD]10
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[TD]0
[/TD]
[/TR]
[/TABLE]
v = 1

My Answer: $$vzw + zw\bar{x} +\bar{v}\bar{y}z\bar{w}$$
 
Technology news on Phys.org
Looks good to me.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

Back
Top