Browse Definitions :
Definition

logic simulator

A logic simulator is a computer program that allows designers and experimenters to conduct virtual tests of complex digital circuitry before working with any hardware. The user can interact with the program to find a component arrangement that will perform a desired task. Once a suitable design has been found, the logic simulator makes it easy to optimize, debug, and modify the circuitry.

All digital systems comprise multiple logic gates, often in vast numbers. Some large or sophisticated systems also contain smaller, self-contained digital devices such flip flops, multiplexers, oscillators, integrators, differentiators, and counters. Each smaller device plays a unique and vital role in the complete system. Before the advent of logic simulators, engineers had to design digital devices and systems by going through a tedious combination of trial-and-error hardware manipulation and educated guesswork.

Logic simulators vary from vendor to vendor, but all offer intuitive GUIs (graphical user interfaces) including toolbars, drag and drop, color coding, and online help. Some programs also offer animation, signal tracing, and alternative logic-gate interconnection options. On the downside, logic simulators run far more slowly than the actual systems do (in some cases millions of times more slowly). Logic simulators can also place significant demands on computer resources because of the vast number of parallel hardware processes that take place in any nontrivial digital system.

 

Continue reading about logic simulators:

The University of Michigan Department of Electrical Engineering and Computer Science outlines logic simulation processes.

Read about basic logic simulation methods at tutorial-reports.com.

Yashusi Umezawa of Fujitsu Laboratories discusses how logic simulation can help engineers check data integrity.

This was last updated in February 2012

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close