Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem1. The use of satellites in RF communication systems is very much a fact in everyday life.

(i) What are INTELSAT and INSAT satellites?

(ii) Differentiate between polar orbiting satellites and geostationary satellites.

(iii) By referring to artificial satellites orbiting the earth, state Kepler’s third law.

problem2. A satellite dish is in communication with a geostationary satellite above the earth surface.  The angle over which the satellite dish can lie is 1430.

problem3. For better communication, the dish is tilted at an angle of 100. find out the height of the satellite from the earth surface.

problem4. A satellite makes a north to south equatorial crossing at longitude 900W, completing one revolution around the earth in 102 min.  Assuming that the orbit is circular and crosses exactly over the poles, estimate the following:

(i) The number of orbits per day.

(ii) By how much will the earth rotate eastward in the 102 min?

(iii) The position of the satellite at the time 0h 10 min after the equatorial crossing.

RF Systems and Design (TELC3105)    SITE/DA 2012-2013 S2

problem5. A meteorite is a meteoroid (a solid piece of debris from such sources as asteroids or comets) originating in outer space that survives impact with the Earth's surface.  Radar systems are used to monitor this dangerous phenomenon.  In one such situation, a radar system of transceiver antenna gain of 4000, operating at a frequency of 10 GHz with a peak pulse power of 250 KW is used to track down a meteoroid. If the power pulse received at a range of 50 km is 10-11W, what is the cross-sectional area of the target meteoroid?

problem6. Using a block diagram, describe the subsystems involved of 2G system architecture.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96030

Have any Question? 


Related Questions in Computer Engineering

1 in a very small as using ospf is it more efficient to use

1. In a very small AS using OSPF, is it more efficient to use only one single area (backbone) or several areas? 2. Why do you think we need only one RIP update message, but several OSPF update messages? 3. OSPF messages ...

1 what is a hybrid firewall2 list the five generations of

1. What is a hybrid firewall? 2. List the five generations of firewall technology. Which generations are still in common use? 3. How does a commercial-grade firewall appliance differ from a commercial-grade firewall syst ...

Commercial matching service scenariowwwbuycomputercom is a

Commercial Matching Service Scenario www.buycomputer.com is a fictitious website to match consumers who wish to purchase computers with businesses who are able to supply them. It works as follows: 1- Consumers can visit ...

1 create an array of 1000 integers sorted in numerical

1. Create an array of 1000 integers sorted in numerical order. Write a program that runs each sorting algorithm with this array, timing each algorithm, and compare the times. Compare these times to the times for sorting ...

In this problem we will studylfsrs in somewhat more detail

In this problem we will study LFSRs in somewhat more detail. LFSRs come in three flavors: LFSRs which generate a maximum-length sequence. These LFSRs are based on primitive polynomials. LFSRs which do not generate a maxi ...

As is so often true in cryptography it is easy to weaken a

As is so often true in cryptography, it is easy to weaken a seemingly strong scheme by small modifications. Assume a variant of the OFB mode by which we only feed back the 8 most significant bits of the cipher output. We ...

1 some of the application programs can use the services of

1. Some of the application programs can use the services of two transport-layer protocols (UDP or TCP). When a packet arrives at the destination, how can the computer find which transport layer is involved? 2. A client r ...

Assume that our network never corrupts loses or duplicates

Assume that our network never corrupts, loses, or duplicates packets. We are only concerned about flow control. We do not want the sender to overwhelm the receiver with packets. Design an FSM to allow the sender to send ...

Computer class assignmentclass consider your current or

Computer Class Assignment Class, Consider your current or future career (nursing), clubs or volunteer activities or any other occupations where a PowerPoint presentation might be advantageous. Where might you use PowerPo ...

A uniprocessor has an l1 and an l2 cache with no cache

A uniprocessor has an L1 and an L2 cache. With no cache misses, the processor achieves a CPI of 1. Suppose that in reality an L1 miss occurs every 50 cycles and that an L2 miss occurs every 500 cycles. The L1 miss penalt ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro