Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Electrical & Electronics Expert

problem1: Consider the noise cancellation system described below. The useful signal is a sinusoid s(n) = cos (wo n + Φ), wo = Π/12 where the phase Φ is a random variable uniformly distributed from 0 to 2 Π. The noise signals are given by:

891_noise signals.jpg

Where the sequence w(n) is WGN(0,1).

a) Design an optimum filter of order M and select a reasonable value M0 for M by plotting the MMSE as a function of M.

b) Design an LMS filter with M0 coefficients and choose the step size μ to achieve a 10% miss adjustment.

c) Plot the signals s(n), s(n)+v1(n), v2(n), the clean signal e0(n) by using the optimum filter, and the clean signal elms(n) using the LMS filter and comment on the obtained results.

d) Re-solve the above noise cancellation problem by using the RLS and comment on the differences between RLS and LMS in terms of speed of convergence and excess error.

1884_noise cancellation.jpg

problem 2: Consider the process x(n) generated by using AR(1) model x(n) = - 0.729 x (n - 1) + w(n); where w(n) is WGN(0,1).
We want to design a linear predictor of x(n) using the Steepest Descent Algorithm (SDA). Let

126_steepest descent algorithm.jpg

a) Find out the 3x3 autocorrelation matrix R of x(n) and compute its Eigen values.

{λi}3i-1

b) Find out the 3x1 cross correlation vector d.

c) Choose the step size μ so that the resulting response is over damped. Now implement the SD

1476_over damped.jpg

d) Repeat part (c) by choosing μ so that the response is under damped.

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M9485

Have any Question? 


Related Questions in Electrical & Electronics

A cryptographic hash function needs to be second preimage

A cryptographic hash function needs to be second preimage resistant, which means that given the message M and the message digest d, we should not be able to find any other message, M′, whose digest is d. In other words, ...

1 discuss polarization of sinusoidally time-varying fields

1. Discuss polarization of sinusoidally time-varying fields, as it is relevant to propagation of uniform plane waves. 2. Discuss the propagation of uniform plane waves arising from an infinite plane current sheet of nons ...

1 in dictionary coding if there are 60 characters in the

1. In dictionary coding, if there are 60 characters in the message, how many times is the loop in the compression algorithm iterated? Explain. 2. In dictionary coding, should all dictionary entries that are created in th ...

Through a series of tests on pipe flow h darcy derived an

Through a series of tests on pipe flow, H. Darcy derived an equation for the friction loss in pipe flow as in which f is a dimensionless coefficient that depends on (a) the average velocity v of the pipe flow; (b) the pi ...

1 we defined two security services for e-mail pgp and smime

1. We defined two security services for e-mail (PGP and S/MIME). Explain why e-mail applications cannot use the services of SSL/TLS and need to use either PGP or S/MIME. 2. Assume Alice needs to send an e-mail to Bob. Ex ...

1 what is the direction of the magnetic field for a uniform

1. What is the direction of the magnetic field for a uniform plane wave having its electric field in the positive z-direction and propagating in the positive x-direction? 2. What is intrinsic impedance? What is its value ...

For the euler beam element shown in the figure derive the

For the Euler beam element shown in the figure, derive the interpolation functions, N I (ξ), stiffness matrix, k, and nodal force vector, f. Assume that the uniformly distributed load is  f (x) = f. Note that the referen ...

1 assume an application program uses separate audio and

1. Assume an application program uses separate audio and video streams during an RTP session. How many SSRCs and CSRCs are used in each RTP packet? 2. Can we say UDP plus RTP is the same as TCP? 3. Why does RTP need the ...

Assume we have a very simple message digest our unrealistic

Assume we have a very simple message digest. Our unrealistic message digest is just one number between 0 and 25. The digest is initially set to 0. The cryptographic hash function adds the current value of the digest to t ...

1 discuss briefly the application of gauss law for the

1. Discuss briefly the application of Gauss' law for the electric field to determine the electric field due to charge distributions. 2. State Gauss' law for the magnetic field. How is it derived from Faraday's law? 3. Wh ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro