MHB Verilog Code: Implementing f(x,y,z) = x*y + y*z + x*z | Check My Work

  • Thread starter Thread starter shamieh
  • Start date Start date
  • Tags Tags
    Code
AI Thread Summary
The discussion revolves around a request for assistance with Verilog code, specifically for a module that implements the function f(x,y,z) = X*Y + Y*Z + X*Z. The original code provided uses bitwise AND and OR operations, which do not align with the required arithmetic operations. A suggestion is made to revise the code to use multiplication (*) and addition (+) operators instead, which would correctly implement the specified function. The response emphasizes the importance of using the correct operators in Verilog to achieve the desired output.
shamieh
Messages
538
Reaction score
0
Figured this would be the safest place to post a question about Verilog Code seeing as how the people answering all my questions have obviously took this class. If there is another place I should post it then please inform me.

Just need someone to check my work.

Question: Write the verilog module test that implements the following function: f(x,y,z,)- X*Y+Y*Z+X*Z

My Answer:

Code:
Module test1(f,x,y,z);
         input x,y,z;
         output f;

         assign f = x&y | y&z | x&z;
endmodule
 
Technology news on Phys.org
shamieh said:
Write the verilog module test that implements the following function: f(x,y,z,)- X*Y+Y*Z+X*Z
Your code does bitwise ANDs and ORs, which seems to be at odds with what you're asked to do.
Something like this might be closer to what you're supposed to do.
Code:
Module test1(input x, input y, input z, output f);
        assign f = x * y + y * z + x * z;
endmodule
I'm by no means an expert in Verilog, so caveat emptor.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Back
Top