Questions
using matlab, compute and plot y [n] = x [n]* h [n], where a. x [n]...

using matlab, compute and plot y [n] = x [n]* h [n], where
a. x [n] = h [n] = a^n (0 <=n <=40) & a = 0.5
b. x [n] = cos [n]; h [n] = u [n]; n = 0:4:360
c. x [n] = sin [n] ; h [n] = a^n; n:4:360; a = 0.9

In: Electrical Engineering

+5V to +12V DC to DC Switching Converter. The circuit works by charging a +5V DC...

+5V to +12V DC to DC Switching Converter. The circuit works by charging a +5V DC Input voltage into a +12DC Output Voltage and charging wth capacitors. The switches turns off and on when to charge and output. Explain the solution and how this works in depth. 1.5 - 2 Paragraph.

In: Electrical Engineering

given the sequences  x1 = [2, 6, -4, 1] x2 = [8, 0, 2, 0, -9,...

given the sequences 
x1 = [2, 6, -4, 1]
x2 = [8, 0, 2, 0, -9, 0, 1, 0]
x3 = [2, 0, -8, -8, 2]
x4 = [0, 1, 5i, 0, 6i, 0]
x5 = [9, 3, 7]
plot the
1. DFT magnitude of the computed sequences in MATLAB 
2. phase responses in degrees and radians against frequency and number of samples
3. comment on the plots

In: Electrical Engineering

Explain the basic requirements of security in WSN system. You are required to design your own...

Explain the basic requirements of security in WSN system.
You are required to design your own security protocol with start byte, stop byte, payload along with security codes in your WSN based project. You are asked to send the data 3A20F14B. Select the security bytes and provide necessary explanation.

In: Electrical Engineering

essay about life of ex-colored man's experience in the south as narrated by Walden Johnson

essay about life of ex-colored man's experience in the south as narrated by Walden Johnson

In: Electrical Engineering

A certain practical current source provides 0.1890625 W to a 90 ? load. That same practical...

A certain practical current source provides 0.1890625 W to a 90 ? load. That same practical current source provides 0.1987425 W to an 730 ? load. If the same practical current source had a resistance RL is connected to it, creating a voltage across RL of vL and a current through RLof iL. Find the values of RL, vL, and iL if
(a) vL×iLvL×iL is maximum
(b) vL is a maximum
(c) iL is a maximum.

(a) RL =  ? , vL =  V , iL =  A

(b) RL = ? , vL =  V , iL =  A

(c) RL =  ? , vL =  V , iL =  A

In: Electrical Engineering

Research a commercial Infra Red Thermometer. Describe the principle operation and application. Include the data sheet

Research a commercial Infra Red Thermometer. Describe the principle operation and application. Include the data sheet

In: Electrical Engineering

Using a simple numerical model with global supply of energy resources denoted as R; world population...

Using a simple numerical model with global supply of energy resources denoted as R; world population as N; per capita energy consumption as E, S as the standard of living and efficiency of transforming energy into wealth denoted by f, show that it is vital to have a growth in the efficient use and generation of energy in order to increase the standard of living (S) and decrease the energy resource use (R).

In: Electrical Engineering

Explain how two electrical substations of different voltage are connected

Explain how two electrical substations of different voltage are connected

In: Electrical Engineering

The literature review of raspberry pi, also after that write Component that is technically used and...

The literature review of raspberry pi, also after that write Component that is technically used and Drawback of the subject what u choose

brief of the subject:

A component that is technically used:

Drawback:

In: Electrical Engineering

4. Explain why the potential of a glow discharge (plasma region) used in dry etching is...

4. Explain why the potential of a glow discharge (plasma region) used in dry etching is positive, relative to ground.

In: Electrical Engineering

R1. What is the difference in how wireless hosts are connected and what services must be...

R1. What is the difference in how wireless hosts are connected and what services must be provided between “Infrastructure mode” and “ad hoc” mode?

R3. Define and explain how each are different:

path loss,

multipath propagation,

interference from other sources

R5. Why are beacon frames used in 802.11 ?

R8. How are Ethernet and 802.11 frame structures different?

R14. What frame structure mode of operation types are supported by Wi-max? What does Wi-max architecture resemble?

R19. What are the purposes of the HLR and VLR in GSM networks? What elements of mobile IP are similar to the HLR and VLR?

R21. What are the three approaches that can be taken to avoid having a single wireless link degrade the performance of an end- end transport-layer TCP connection?

Chapter 6 Problems

P6. Looking at CSMA/CA: In step 4 of the CSMA/ CA protocol, a station that successfully transmits a frame begins the CSMA/ CA protocol for a second frame at step 2!, rather than at step 1. Why not transmit the second frame immediately (if the channel is sensed idle)?

P7. Suppose an 802.11b station is configured to always reserve the channel with the RTS/ CTS sequence. Suppose this station suddenly wants to transmit 10,000 bytes of data, and all other stations are idle at this time. As a function of SIFS and DIFS (this means the equation contains SIFS and DIFS as the only unknown variables), and ignoring propagation delay and assuming no bit errors, calculate the time in seconds required to transmit the frame and receive the acknowledgment. Assume transmission rate of 11Mbps. Suggestion: list the frames that must be sent, compute size and time of each and yes you do know the size of the control frames, then add it up. Show your work.

P9. Looking at the 802.15.1 Bluetooth frame- How many address bits support active connections in a Bluetooth frame header? How many active slaves can be supported? How many total connections?

P11. In Section 6.5, one proposed solution that allowed mobile users to maintain their IP addresses as they moved among foreign networks was to have a foreign network advertise a highly specific route to the mobile user and use the existing routing infrastructure to propagate this information throughout the network. We identified scalability as one concern. Suppose that when a mobile user moves from one network to another, the new foreign network advertises a specific route to the mobile user, and the old foreign network withdraws its route. Consider how routing information propagates in a distance-vector algorithm (particularly for the case of inter-domain routing among networks that span the globe).

Will other routers be able to route datagrams immediately to the new foreign network as soon as the foreign network begins advertising its route?   Why or Why not?

Is it possible for different routers to believe that different foreign networks contain the mobile user? Why or Why not?

In: Electrical Engineering

What is the advantage of using an electronic overload on a large hermetic compressor and how...

What is the advantage of using an electronic overload on a large hermetic compressor and how does the electronic overload sense that this motor is overloading?

In: Electrical Engineering

(7494) Design and implementation of 4 bit shift register using Behavioral style of modeling .... by...

(7494) Design and implementation of 4 bit shift register using Behavioral style of modeling .... by VHDL .. the program should based on the data sheet of 7494 and the truth table ... 13 input and one output D.

In: Electrical Engineering

Convert CC53 (hexidecimal) to the octal equivalent

Convert CC53 (hexidecimal) to the octal equivalent

In: Electrical Engineering