• Articles • Previous Articles    

A Method for Minimization Design of Two-Level Logic Networks Using Multiplexer Universal Logic Modules

Jiang Wenbin;   

  1. Department of Physics; Huaibei Coal Teachers' College; Huaibei 235000;
  • Online:1994-01-10 Published:1994-01-10

A decomposition approach of the combinational functions is discussed. A design method, by which the minimization or near minimization of two-level combinational network can be obtained, is presented for a combinational function realized by using multiplexer universal logic modules. Using the method, the automated synthesis of the combinational functions can be accomplished on a computer.

Key words: finite automata; semi-input-memory; invertibility;



[1] Voith.R.P. ULM implicants for minimization of universal logic module circuits. IEEE Trans Comput, 1977, C-26(5): 417-412.

[2] Cheung.C.C, Ehrich.R.W. On the minimization of tree-type universal logic circuits. IEEE Trans Comput, 1975, C-24(11): 1110-1113.

[3] Pal.A. An algorithm for optimal logic design using multiplexers. IEEE Trans Comput, 1986, C-35(8): 755-757. ……….
[1] Avraham Trahtman. Some Aspects of Synchronization of DFA [J]. , 2008, 23(5 ): 719-727 .
[2] TAO Renji (陶仁骥) and CHEN Shihua (陈世华). Structure of Weakly Invertible Semi-Input-Memory Finite Automata with Delay 2 [J]. , 2002, 17(6): 0-0.
[3] TAO Renji (陶仁骥) and CHEN Shihua (陈世华). Structure of Weakly Invertible Semi-Input-Memory Finite Automata with Delay 1 [J]. , 2002, 17(4): 0-0.
[4] TAO Renji; CHEN Shihua;. Input-Trees of Finite Automata and Application to Cryptanalysis [J]. , 2000, 15(4): 305-325.
[5] TAO Renji(陶仁骥)and CHEN Shihua(陈世华). Input-Trees of Finite Automata and Application to Crytanalysis [J]. , 2000, 15(4): 0-0.
[6] TAO Renji; CHEN Shihua;. Constructing Finite Automata with Invertibility by transformation Method [J]. , 2000, 15(1): 10-26.
[7] Tao Renji; Chen Shihua; Chen Xuemei;. FAPKC3: A New Finite Automaton PublicKey Cryptosystem [J]. , 1997, 12(4): 289-305.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Cai Shijie; Zhang Fuyan;. A Fast Algorithm for Polygon Operations[J]. , 1991, 6(1): 91 -96 .
[2] Huang Guoyong; Li Sanli;. TSP: A Heterogeneous Multiprocessor Supercomputing System Based on i860XP[J]. , 1994, 9(3): 285 -288 .
[3] Lu Bo; Cai Shijie;. A Skeleton-Based Approach of Automatically Generating Some Chinese Typefaces[J]. , 1996, 11(1): 30 -38 .
[4] I-Shyan Hwang, I-Feng Huang, and Shin-Cheng Yu. Dynamic Fuzzy Controlled RWA Algorithm for IP/GMPLS over WDM Networks[J]. , 2005, 20(5): 717 -727 .
[5] Ian Foster. Globus Toolkit Version 4: Software for Service-Oriented Systems[J]. , 2006, 21(4): 513 -520 .
[6] Jie Liang and Xue-Jia Lai. Improved Collision Attack on Hash Function MD5[J]. , 2007, 22(1): 79 -87 .
[7] Jia Li, Li-Yong Shen, and Xiao-Shan Gao. Proper Reparametrization of Rational Ruled Surface[J]. , 2008, 23(2): 290 -297 .
[8] Daniel Cohen-Or. Space Deformations, Surface Deformations and the Opportunities In-Between[J]. , 2009, 24(1 ): 1 -5 .
[9] Anna Gutowska, Andrew Sloane, and Kevan A. Buckley. On Desideratum for B2C E-Commerce Reputation Systems[J]. , 2009, 24(5): 820 -832 .
[10] Moonki Jung, Hyundeok Cho, Taehwan Roh, and Kunwoo Lee. Integrated Framework for Vehicle Interior Design Using Digital Human Model[J]. , 2009, 24(6): 1149 -1161 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved