An algorithm for multiple output minimization
نویسندگان
چکیده
Absfracf-A computer-aided design procedure for the minimization of multiple output Boolean functions as encountered in the synthesis of VLSI logic circuits i s presented in this paper. A fast technique for the determination of essential prime cubes without generating all the prime cubes i s among the salient features of the algorithm. The paper also describes a new class of selective prime cubes called valid selective prime cubes. This new class of prime cubes has proved to be a very powerful tool inasmuch as it guides the algorithm to the minimal set of selective prime cubes while encountering either an independent chain or an interconnected chain of cyclic prime cubes. I n many cases, this avoids branching which is computationally an expensive operation. The algorithm does not generate either the complement or all the prime cubes of the functions. Therefore, it is well suited to minimize functions with large complement size and/or very high number of prime cubes. The algorithm has been implemented in Pascal and evaluated using a large number of programmable logic arrays (PLA's) including those of the Berkeley PLA test set. Results of comparison with ESPRESSO I1 111 and McBOOLE [2] indicate that the program produces absolute minimal solution in most of the cases and near minimal in a few others.
منابع مشابه
An Intelligent Algorithm based Controller for Multiple Output DC-DC Converters with Voltage Mode Weighting Factor
Multiple output DC-DC converters are widely used in many applications such as aerospace, industrial and medical equipments. The purpose of this paper is to present an intelligent control system for the multiple output DC-DC converters. In order to perform this purpose, a double ended forward DC-DC converter with three output voltages (+5 V/ 50W, +15 V/ 45W and -15 V/ 15W) is considered and anal...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملTHD Minimization of the Output Voltage for Asymmetrical 27-Level Inverter using GA and PSO Methods
Multilevel voltage source inverters have several advantages compare to traditional voltage source inverter. These inverters reduce cost, get better voltage waveform and decrease Total Harmonic Distortion (THD) by increasing the levels of output voltage. In this paper Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) methods are used to find the switching angles for achieving to the m...
متن کاملStrong convergence theorem for a class of multiple-sets split variational inequality problems in Hilbert spaces
In this paper, we introduce a new iterative algorithm for approximating a common solution of certain class of multiple-sets split variational inequality problems. The sequence of the proposed iterative algorithm is proved to converge strongly in Hilbert spaces. As application, we obtain some strong convergence results for some classes of multiple-sets split convex minimization problems.
متن کاملAn approximation algorithm and FPTAS for Tardy/Lost minimization with common due dates on a single machine
This paper addresses the Tardy/Lost penalty minimization with common due dates on a single machine. According to this performance measure, if the tardiness of a job exceeds a predefined value, the job will be lost and penalized by a fixed value. Initially, we present a 2-approximation algorithm and examine its worst case ratio bound. Then, a pseudo-polynomial dynamic programming algorithm is de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Trans. on CAD of Integrated Circuits and Systems
دوره 8 شماره
صفحات -
تاریخ انتشار 1989