MHB Is My Product of Sums Equation and NOR Gate Schematic Correct?

AI Thread Summary
The discussion focuses on verifying the work related to a logic function expressed in terms of its minterms and don't care conditions. The first task involves finding the minimum Product of Sums (POS) equation using a Karnaugh Map (K-Map). The proposed solution is (\bar{w} + x)(\bar{y} + z + \bar{x})(y + w + \bar{x}). The second task is to create a schematic for a minimized circuit using NOR gates. It is noted that while NOR gates can represent all basic logic functions, using them efficiently requires careful handling of inputs to avoid unnecessary duplication, which can lead to larger circuit designs. The suggestion is to split outputs for better efficiency in circuit construction.
shamieh
Messages
538
Reaction score
0
Just need someone to check my work. Couldn't find the problem via Google.

$f$(W,X,Y,Z) M (0,1,2,7,12,15) + d(3,13).

1)Find the minimum Product of Sums equation using a K-Map.

2)Draw a schematic of a minimized circuit implementing the logic using NOR gates.

1) My Answer: $$(\bar{w} + x)(\bar{y} + z + \bar{x})(y + w + \bar{x})$$

2) My Answer: View attachment 1411
 

Attachments

  • pphoto.png
    pphoto.png
    27.4 KB · Views: 106
Technology news on Phys.org
I agree with 1). As for 2), NOR can express AND, OR and NOT: see Wikipedia. However, expressing the usual connectives through NOR requires duplication of inputs. For example, PQ (the conjunction of P and Q) equals (P NOR P) NOR (Q NOR Q). If P is itself a big expression, the resulting expression is at least twice as big because P is used two times. So when constructing a circuit, you probably should split the output of P and feed it into both inputs of NOR instead of having two sub-circuits representing P.
 
on)

Thank you.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

Replies
3
Views
3K
Replies
4
Views
2K
Replies
4
Views
3K
Replies
1
Views
2K
Replies
4
Views
2K
Replies
8
Views
3K
Replies
5
Views
3K
Replies
3
Views
3K
Back
Top