MHB Drawing circuits with NAND gates

  • Thread starter Thread starter shamieh
  • Start date Start date
  • Tags Tags
    Circuits Drawing
AI Thread Summary
The discussion focuses on creating a low-cost circuit implementation using only NAND gates for the function f(w,x,y,z) = x*y + w*x + ¬y*¬z. Participants emphasize that while traditional logic gates like NOT can be used, the challenge is to exclusively utilize NAND gates. It is noted that NAND gates can be configured to function as inverters, which is crucial for the implementation. There is some confusion regarding the variables y and z, with participants clarifying their roles in the circuit. The conversation highlights the importance of understanding how to represent logical functions using a restricted set of gates, particularly in optimizing circuit design for cost efficiency.
shamieh
Messages
538
Reaction score
0
A cheap way to implement this circuit is to use only NAND gates. Draw the circuit diagram for the lowest cost implementation using these gates. (reminder: you can wire a NAND gate such that it acts like an inverter).

$f$(w,x,y,z) = $$x*y + w*x + \bar{y}*\bar{z}$$

My solution:
View attachment 1448 Will this work?
 

Attachments

  • photo(1).JPG
    photo(1).JPG
    22.4 KB · Views: 99
Technology news on Phys.org
shamieh said:
Will this work?
Close, but the problem statement says you can use only NAND gates, in particular, no NOT gates. However, NOT is easily expressible through NAND.

logic-gates1.png
 
Wow the fact that you got that your drew that diagram on here is awesome lol. But where is the y y and z z coming from? aren't those unnecesarry?
 
shamieh said:
But where is the y y and z z coming from? aren't those unnecesarry?
I don't understand the question, "Where are they coming from?". Do you know where x is coming from? What's the difference between x and y?
 
Nevermind, I see now.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

Replies
1
Views
3K
Replies
16
Views
2K
Replies
8
Views
3K
Replies
1
Views
3K
Replies
1
Views
2K
Replies
2
Views
2K
Back
Top