Ask Question, Ask an Expert


Ask Computer Engineering Expert

a) Using Octave, prepare and test the set of programming statements to generate two different Sine waves (x1(n) and x2(n)).

b)  Process these two sinewaves through a linear system with the following definition:

                  y(n) = (-3*x(n))/8;

Demonstrate, through ex, that for your two Sine waves, the result of processing sum of your two sine waves, x1(n) + x2(n) by linear system y(n) is same output  as sum of the two outputs, y applied to x1(n) added to y applied to x2(n).

You must provide plots of x1, x2, and x1+x2.  Additionally you must provide plots of y1, (i.e., y applied to x1) and y2 (y applied to x2). At last, you must show in the plot that y1+y2 is the same as y(x1+x2).

Generate various sine waves using different sample rates or oscillations but the net result must show that your system is linear.

Describe why your system is a linear system.

c) Prepare a block diagram for time-invariant linear system that performs a 5-point moving average. Using Octave, then prepare and test Impulse response which tests your 5-point moving average system. Plot both input and the output for the Impulse and the attached dataset (for5avg.m).

You must include a separate Octave m file for each of the problems for this set. Name one your namehw1a.m and the other yournamehw1b.m. These m files must be fully tested and run perfectly from start to finish. The m files would include plotting routines but you must also include a word document which includes your output, explanations, block diagram and other information from both parts of this assignment.  If you prefer to use LaTeX, a freely downloadable tool that many researchers prefer to Word, you are welcome to do so, so long as you send me the .pdf output.

Your plots must be neat, properly labelled, with axis information, legends and titles as suitable. Your code (m file) must include inline comments which describes your code and include header information including author, date and descriptions. Your word document must be named yournamehw1.doc (or yournamehw1.docx)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92914

Have any Question? 

Related Questions in Computer Engineering

Suppose the drib wished to allow employes to telecommute in

Suppose the Drib wished to allow employes to telecommute. In order to protect the network, they require all remote connections (other than those for the Web and mail servers) to use SSH. a. Discuss the required changes i ...

Design an algorithm for power evaluation that is built upon

Design an algorithm for power evaluation that is built upon a base 3 strategy rather than the current base 2 method. Compare the results for this new method with the current algorithm.

Assignment 1system security certification and

Assignment 1 System Security Certification and Accreditation Becoming better acquainted with the history of accreditation and authorization has made you aware that you need to start planning tasks in order to complete a ...

1 what are the types of password attacks what can a systems

1. What are the types of password attacks? What can a systems administrator do to protect against them? 2. What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is mo ...

1 run the life model several times what is the minimum

1. Run the Life model several times. What is the minimum number of ticks before the model stabilizes? What is the maximum number of ticks you can find before it stabilizes? Is it possible for the model to never come to a ...

1 the binary search tree operations can also be implemented

1. The binary search tree operations can also be implemented iteratively. Design and implement an iterative solution for each operation: (a) search (b) find minimum (c) insert (d) delete 2. Design and implement the funct ...

Tracy swallow has a bright idea for avoiding the need to

Tracy Swallow has a bright idea for avoiding the need to store passwords securely. She suggests transforming the user's name with a key-driven cryptographic transformation using a systemwide "password key" and giving the ...

What is the time complexity as a function of the number n

What is the time complexity, as a function of the number n of vertices and m of edges, of the following network operations if the network in question is stored in adjacency list format? a) Calculating the mean degree. b) ...

1 explain why public key encryption is more useful for

1. Explain why public key encryption is more useful for securing communications on the Internet than private (shared) key encryption. 2. As discussed in the chapter, string formatting could be used to simplify the dateco ...

Createnbspa 2- to 3-pagenbspcreatenbspa document of 10

Create  a 2- to 3-page  create  a document of 10 Frequently Asked Questions (FAQ) that you would expect to receive from users of a network, with a well-crafted response or answer. These FAQs should be related to what eac ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen