Academia.eduAcademia.edu

Fig 8. Constructing network using variant of BSSSN  Algorithm BSSSN is straightforward. It is greedy in the sense it hopes that a bit string can be swapped by the one that is in its intended place. Because of Lemma | and 2, it is always possible to find two bit strings for Steps 2 that can be swapped. Therefore, it will always terminate successfully with a circuit for a given specification. The best case occurs when a bit string can always be swapped by the bit string placed in its intended position. A variant of BSSSN takes the bit string in the set whose integer representation is low and brings it to its intended place. Figures 8 and 9 illustrate the application of the variant of BSSSN and the sequence of gates that form the network is: T(b’,c':a)T(b.c':a)T(b’,c:a)T(a.c:b) T(b,c:a).

Figure 8 Constructing network using variant of BSSSN Algorithm BSSSN is straightforward. It is greedy in the sense it hopes that a bit string can be swapped by the one that is in its intended place. Because of Lemma | and 2, it is always possible to find two bit strings for Steps 2 that can be swapped. Therefore, it will always terminate successfully with a circuit for a given specification. The best case occurs when a bit string can always be swapped by the bit string placed in its intended position. A variant of BSSSN takes the bit string in the set whose integer representation is low and brings it to its intended place. Figures 8 and 9 illustrate the application of the variant of BSSSN and the sequence of gates that form the network is: T(b’,c':a)T(b.c':a)T(b’,c:a)T(a.c:b) T(b,c:a).