MHB Minimal cost of circuit implementation

  • Thread starter Thread starter shamieh
  • Start date Start date
  • Tags Tags
    Circuit
AI Thread Summary
The discussion focuses on implementing a specific logic circuit using NOR gates for cost efficiency. The function f(w,x,y,z) = (w + y) * (x + z) can be effectively realized with three NOR gates. The first two NOR gates process the inputs (W, Y) and (X, Z) respectively, producing outputs A and B. These outputs are low when either input is high, reflecting the behavior of a Negative logic AND gate. The third NOR gate combines these outputs, resulting in a final output that is high only when both A and B are low, effectively converting the negative logic back to positive logic. This method demonstrates a streamlined approach to circuit design using fewer components while maintaining functionality.
shamieh
Messages
538
Reaction score
0
A cheap way to implement this circuit is to use NOR gates. Draw the circuit diagram for the lowest cost implementation using these gates.
f(w,x,y,z) = (w + y) * (x + z)
SOLVED.

Solution: w + y with ! inverters and x + z with not inverters to another NOR gate which makes them positive again.
 
Last edited:
Technology news on Phys.org
I beg to differ:

Only three NOR gates are needed; the first two handle the W,Y and X,Z inputs; which are then fed directly to a 3rd NOR. Since the 3rd NOR is fed the negation of the input requirements, it acts as a Negative logic AND gate. And since the 3rd NOR is also inverting, the final output is back to Positive logic.

Consider:
Assuming Positive logic.
1) label the output of the 1st NOR gate as A= (W + Y). A will be Lo if either W or Y is Hi (True)

2) same approach for 2nd NOR gate B= (X + Z). B will be Lo if either if either X or Z is HI (True)

3) 3rd NOR gate as Out= (A + B). Out will be Hi if-and-only-if inputs both A and B are Lo

Cheers,
Tom
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

Replies
4
Views
3K
Replies
3
Views
3K
Replies
15
Views
3K
Replies
16
Views
2K
Replies
4
Views
2K
Back
Top