Questions
Design and build am 8bit DAC using the LM741 OP Amp. Select your resistor values to...

Design and build am 8bit DAC using the LM741 OP Amp. Select your resistor values to allow typical current levels into the OP Amp. Analyze the system using five different byte values. The following byte values must be included, 1000 1000, and 1111 1110. Show your work. Use all your knowledge gain while studying under the CET degree,

In: Electrical Engineering

Q1) Plot the root locus for the following systems where the given transfer function is located...

Q1) Plot the root locus for the following systems where the given transfer function is located in a unit negative feedback system, i.e., the characteristic equation is 1+KG(s)=0. Where applicable, the plot should indicate the large gain asymptotes, the angle of departure from complex poles, the angle of arrival at complex zeros, and breakaway points. Verify your answer using MATLAB (“rlocus” command) and show the results obtained from MATLAB.

a) G(s) = (s + 4) (s + 2) 2 (s +1+ j4)(s +1? j4)

b) G(s) = 1 s(s + 2)(s 2 + 2s + 2)

c) G(s) = (s 2 + 25) s(s +1)(s + 2)

d) G(s) = 1 s(s 2 + 4s + 3)

e)  G(s) = (s + 3) s 2 (s + 4)

f) G(s) = (s +1) s 2 (s + 2)

In: Electrical Engineering

Part 5 The frequency response of RLC circuits : Design a passive filter: Band Pass, ISM...

Part 5 The frequency response of RLC circuits :

Design a passive filter: Band Pass, ISM Band 433.050 MHz to 434.790 MHz . Prepare a report to describe your design. Your results should include the following :
i. Simulation of the designed filters by using any simulation software.

ii. Attach a 1 kΩ resistor as a load to the initial design of your filter. Explain how the transfer function change. Does the type of filter
change? Does the cut-off frequency change?

iii. Is it possible to build a second order filter with only resistors and capacitors? Justify your answers.

Marks will be given based on the literary, originality, design procedures, results, discussion, conclusion, presentation, references and writing skills.

In: Electrical Engineering

What is the difference between characterization testing (also known as validation) and production testing?

What is the difference between characterization testing (also known as validation) and production testing?

In: Electrical Engineering

Is there a solution for this anywhere?  Chapter 9, Problem 16P, 5th edition, Matlab for engineers

Is there a solution for this anywhere?  Chapter 9, Problem 16P, 5th edition, Matlab for engineers

In: Electrical Engineering

Plot an ideal C-V curve for a Si- SiO2 MOS capacitor at 300 K with NA=5x1015...

Plot an ideal C-V curve for a Si- SiO2 MOS capacitor at 300 K with NA=5x1015 cm-3, d=3 nm (specify Cox, Cmin, CFB and VT). If the metal work function is 4.5 eV, q?=4.05 eV, Qf/q=1011 cm-2, Qm/q=1010 cm-2, Qof/q=5x1010 cm-2, and Qit=0, plot the corresponding CV curve (specify VFB and the new VT).

In: Electrical Engineering

Use for statements to find the values of x(t) = 3 cos (2?ft + 0.1) for...

Use for statements to find the values of x(t) = 3 cos (2?ft + 0.1) for t = 0,

01, 0.2, 0.3, 0.4 s when f =10, 15, and 20 Hz. Use one set ofstatements to compute the values for all three frequencies and store the results in a two-dimensional array. Use two nested for loops and double indexing.

In: Electrical Engineering

This is MRI. If a sample is put in a magnetic field with B0=1.5T (the most...

This is MRI.

If a sample is put in a magnetic field with B0=1.5T (the most common clinical field strength), and a z gradient with strength Gz=3 Gauss/cm is applied (note conversion 10,000 Gauss/Tesla), what is the Larmor frequency for the protons on the z=0 plane? If you want to image a slice with thickness of 5mm centered at z=0, what is the range of frequencies in the slice?

In: Electrical Engineering

design full adder using 4:1 mux

design full adder using 4:1 mux

In: Electrical Engineering

Summarize in your own understanding what would be the requirement in LTE design for DL and...

Summarize in your own understanding what would be the requirement in LTE design for DL and UL CoMP to work as expected.

In: Electrical Engineering

WHAT ARE THE KEY CONCEPTS YOU NEED TO KNOW ABOUT THE IT NETWORK ENGINEERING? PLEASE EXPLAIN...

WHAT ARE THE KEY CONCEPTS YOU NEED TO KNOW ABOUT THE IT NETWORK ENGINEERING?

PLEASE EXPLAIN THE GENERAL CONCEPTS YOU NEED TO KEEP IN MIND AND BEGIN WITH (Port configurations, linux environments, or the topologies)

PLEASE GIVE SOME GOOD REFERENCES AND BOOKS TO LOOK INTO FOR THE EXAMS FOR COMPTIA SECURITY + EXAM

PLEASE ALSO RECOMMEND THE CERTIFICATION COURSES OR PREPARATION COURSES THAT CAN ACE THE EXAMS

THE CompTIA CySA+ (CompTIA IT Certifications) CONSISTS OF

- I.T FUNDEMENTALS EXAM

- A+ EXAM

- Network+ EXAM

- Security+ EXAM

, etc.


PLEASE GIVE THE BOOKS OR REFERENCES OR LINKS I COULD USE FOR THE GOOD REFERENCES FOR PREPARING AND STUDYING EXAMS

IT SEEMS THERE ARE ONLINE PROGRAMS AND BOOKS I COULD USE

PLEASE GIVE AND SHARE YOUR THOUGHTS ON THE BEST REFERENCES FOR THE BEIGNNER WHO HAS LITTLE KNOWLEDGE ABOUT THE IT CONCEPTS AND RECOMMEND THE ONLINE PROGRAMS WHAT YOU WOULD THINK IT IS GOOD TO USE:

BOOKS (COOK BOOKS, EASILY UNDERSTANDABLE CONCEPTS, ETC)

ONLINE PROGRAMS OR CLASSES

I WANT SOME RECOMMENDATIONS OF THE REFERENCES THAT CONSISTS OF CONCEPTS EXPLAINED IN EASY STEPS AND PRACTICE PROBLEMS AND HELP PASSING THE EXAMs

PLEASE ANSWER THE QUESTION IF YOU KNOW YOU HAVE PRIOR KNOWLEDGE ON IT ENGINEERING OR SOMEWHAT CLOSE

In: Electrical Engineering

What is continuous monitoring. How can this be applied to conserve energy?

What is continuous monitoring. How can this be applied to conserve energy?

In: Electrical Engineering

Engineering Ethics Course Codes of Ethics Assignment Review the Intel Pentium Chip case (Case below) and...

Engineering Ethics Course

Codes of Ethics Assignment


Review the Intel Pentium Chip case (Case below) and answer following questions:


1. Which statements in IEEE’s code of ethics do you believe Intel violated in this case? For each statement you select, justify your selection with an explanation.


2. Given that Intel perceived that the chip flaw was insignificant, and that flaws are likely to occur in early versions of a chip, what approach do you think Intel should have followed as they put the chips on sale?

The Intel Pentium® Chip Case

In late 1994, the media began to report that there was a flaw in the new Pentium microprocessor produced by Intel. The microprocessor is the heart of a personal computer and controls all of the operations and calculations that take place. A flaw in the Pentium was especially significant, since it was the microprocessor used in 80% of the personal computers produced in the world at that time.

Apparently, flaws in a complicated integrated circuit such as the Pentium, which at the time contained over one million transistors, are common. However, most of the flaws are undetectable by the user and don’t affect the operation of the computer. Many of these flaws are easily compensated for through software. The flaw that came to light in 1994 was different: It was detectable by the user. This particular flaw was in the floating-point unit (FPU) and caused a wrong answer when double-precision arithmetic, a very common operation, was performed.

A standard test was widely published to determine whether a user’s microprocessor was flawed. Using spreadsheet software, the user was to take the number 4,195,835, multiply it by 3,145,727, and then divide that result by 3,145,727. As we all know from elementary math, when a number is multiplied and then divided by the same number, the result should be the original number. In this example, the result should be 4,195,835. However, with the flawed FPU, the result of this calculation was 4,195,579 [Infoworld, 1994]. Depending on the application, this six-thousandths-of-a-percent error might be very significant.

At first, Intel’s response to these reports was to deny that there was any problem with the chip. When it became clear that this assertion was not accurate, Intel switched its policy and stated that although there was indeed a defect in the chip, it was insignificant and the vast majority of users would never even notice it. The chip would be replaced for free only for users who could demonstrate that they needed an unflawed version of the chip [Infoworld, 1994]. There is some logic to this policy from Intel’s point of view, since over two million computers had already been sold with the defective chip.

Of course, this approach didn’t satisfy most Pentium owners. After all, how can you predict whether you will have a future application where this flaw might be significant? IBM, a major Pentium user, canceled the sales of all IBM computers containing the flawed chip. Finally, after much negative publicity in the popular personal computer literature and an outcry from Pentium users, Intel agreed to replace the flawed chip with an unflawed version for any customer who asked to have it replaced.

It should be noted that long before news of the flaw surfaced in the popular press, Intel was aware of the problem and had already corrected it on subsequent versions. It did, however, continue to sell the flawed version and, based on its early insistence that the flaw did not present a significant problem to users, seemingly planned to do so until the new version was available and the stocks of the flawed one were exhausted. Eventually, the damage caused by this case was fixed as the media reports of the problem died down and as customers were able to get unflawed chips into their computers. Ultimately, Intel had a write-off of 475 million dollars to solve this problem.

What did Intel learn from this experience? The early designs for new chips continue to have flaws, and sometimes these flaws are not detected until the product is already in use by consumers. However, Intel’s approach to these problems has changed. It now seems to feel that problems need to be fixed immediately. In addition, the decision is now based on the consumer’s perception of the significance of the flaw, rather than on Intel’s opinion of its significance.

Indeed, similar flaws were found in 1997 in the early versions of the Pentium II and Pentium Pro processors. This time, Intel immediately confirmed that the flaw existed and offered customers software that would correct it. Other companies also seem to have benefited from Intel’s experience. For example, Intuit, a leading manufacturer of tax preparation and financial software, called a news conference in March of 1995 to apologize for flaws in its TurboTax software that had become apparent earlier in that year. In addition to the apology, they offered consumers replacements for the defective software.

In: Electrical Engineering

In an ADC, assume that Vref is connected to 2.3 V. Find the following. Assume an...

In an ADC, assume that Vref is connected to 2.3 V. Find the following. Assume an 9-bit option.

a-) Step Size = Answer mV (answer must have 3 digits after the decimal point, rounded).

b-) D8..D0 values if Vin = 1.39V Answer (answer should be rounded and then converted)

c-) D8..D0 values if Vin = 2.17V Answer (answer should be rounded and then converted)

d-) Vin if D8..D0 values are 001010101 => Answer V (answer must have 3 digits after the decimal point, rounded).

e-) Vin if D8..D0 values are 111011011 => Answer V (answer must have 3 digits after the decimal point, rounded).

In: Electrical Engineering

1-Find another example for any control technique (torque, position, velocity, etc.) that can be applied with...

1-Find another example for any control technique
(torque, position, velocity, etc.) that can be applied with servo motors to show the superiority of one
control method to the other. Explain deeply.)

2-(Describe in detail how the sinusoidal PWM signal used to drive AC servo motors is
generated.)

In: Electrical Engineering