Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Electrical & Electronics Expert

problem 1)a) What do you mean by information? What are its units? How does it relate to the entropy?

b) Suppose we have ten messages of probabilities: P(m1) = 0.49, P(m2) = 0.14,P(m3) = 0.14, P(m4) = 0.07, P(m5) = 0.07, P(m6)=.04, P(m7) = 0.02, P(m8) = 0.02, P(m9) = 0.005, P(ml0) = 0.005. Determine the Shanon Fano code for the set of messages. Determine coding efficiency and redundancy.

problem 2) A transmitter has the alphabet consisting of five letters (x1 x2, x3, x4, x5) and receiver has the alphabet of four letters (y1, y2, y3, y4). The probabilities are P (x1) = 0.2 5, P(x2) = 0. 4, P(x3) = 0.1 5, P(x4) = 0.15, P(x5) = 0.05 and

P(Y/X) =

         Y1         Y       y3       y4
X1      1          0          0          0
X2    0.25     0.75       0          0
X     0        1/3       2/3        0
X4      0          0         1/3      2/3
X     0          0           1          0

Compute entropies {H(Y), H(X, Y), H(X), H(X/Y), H(Y/X)} and I(X, Y).

problem 3)a) State and describe Sampling theorem in detail. describe how is it useful in communication systems?

b) describe Shanon’s Hartley theorem based on channel capacity. How does channel capacity modify if bandwidth is increased to infinity? describe the orthogonal signalling performance on the basis of theorems.

problem 4) Describe the significance of the following:

a) Companding.

b) Prediction filters.

c) Adaptive filters.

d) Equalization

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M99546

Have any Question? 


Related Questions in Electrical & Electronics

Assignmentinstructionssave this document and place your

Assignment Instructions Save this document and place your answers into it so you can submit it to the appropriate homework dropbox. Handwritten solutions should be scanned and saved as a BMP, GIF, or JPG image, or scanne ...

A cryptographic hash function needs to be second preimage

A cryptographic hash function needs to be second preimage resistant, which means that given the message M and the message digest d, we should not be able to find any other message, M′, whose digest is d. In other words, ...

Suppose that a discrete-time system is specified by the

Suppose that a discrete-time system is specified by the transfer function Compute and plot a. The step response of the system b. The impulse response of the system c. The response of the system to the input signal

1 show the outline of a routing table for pastry with

1. Show the outline of a routing table for Pastry with address space of 16 and b = 2. Give some possible entries for each cell in the routing table of Node N21. 2. In a Pastry network using DHT, in which m = 4 and b = 2, ...

1 discuss how the cutoff condition arises in a waveguide2

1. Discuss how the cutoff condition arises in a waveguide. 2. Explain the relationship between the cutoff wavelength and the spacing between the plates of a parallel-plate waveguide based on the phenomenon at cutoff.

1 what is the propagation vector interpret the significance

1. What is the propagation vector? Interpret the significance of its magnitude and direction. 2. Discuss how the phase constants along the coordinate axes are less than the phase constant along the direction of propagati ...

Approximate by a number of terms of your choice through the

Approximate (by a number of terms of your choice) through the three forms of Fourier series expansion the periodic signal that in one period is given by Each time, a. Plot the approximate signal in time of three periods. ...

An exhaust stream leaving a semiconductor fabrication plant

An exhaust stream leaving a semiconductor fabrication plant contains 4 mol % volatile organic chemical, VOC, pollutant. Twenty-five cubic meters per minute enter the bottom of a packed absorption tower and flows counterc ...

1 implement the half adder circuit on the breadboard2

1. Implement the half adder circuit on the breadboard. 2. Implement the full adder circuit on the breadboard. 3. Using the 2-bit adder presented in the chapter as a model, implement a 4-bit adder in Logisim. Implement an ...

1 consult an appropriate reference book and compare the

1. Consult an appropriate reference book and compare the procedure used for obtaining the electromagnetic field due to the Hertzian dipole with the procedure used here. 2. What are radiation fields? Why are they importan ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro