Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem1. The use of satellites in RF communication systems is very much a fact in everyday life.

(i) What are INTELSAT and INSAT satellites?

(ii) Differentiate between polar orbiting satellites and geostationary satellites.

(iii) By referring to artificial satellites orbiting the earth, state Kepler’s third law.

problem2. A satellite dish is in communication with a geostationary satellite above the earth surface.  The angle over which the satellite dish can lie is 1430.

problem3. For better communication, the dish is tilted at an angle of 100. find out the height of the satellite from the earth surface.

problem4. A satellite makes a north to south equatorial crossing at longitude 900W, completing one revolution around the earth in 102 min.  Assuming that the orbit is circular and crosses exactly over the poles, estimate the following:

(i) The number of orbits per day.

(ii) By how much will the earth rotate eastward in the 102 min?

(iii) The position of the satellite at the time 0h 10 min after the equatorial crossing.

RF Systems and Design (TELC3105)    SITE/DA 2012-2013 S2

problem5. A meteorite is a meteoroid (a solid piece of debris from such sources as asteroids or comets) originating in outer space that survives impact with the Earth's surface.  Radar systems are used to monitor this dangerous phenomenon.  In one such situation, a radar system of transceiver antenna gain of 4000, operating at a frequency of 10 GHz with a peak pulse power of 250 KW is used to track down a meteoroid. If the power pulse received at a range of 50 km is 10-11W, what is the cross-sectional area of the target meteoroid?

problem6. Using a block diagram, describe the subsystems involved of 2G system architecture.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96030

Have any Question? 


Related Questions in Computer Engineering

How might you combine top-down and bottom-up approaches how

How might you combine top-down and bottom-up approaches? How might a combination minimize the weaknesses of each?

Assignmentoverviewthe final exam consists of 8 essay

Assignment Overview: The Final Exam consists of 8 Essay Questions. Students will select and answer 4 of the 8 questions. If you answer more than 4 only the first four answered sequentially will be assessed. Students are ...

Name the document measurements1xsda xml declaration should

Name the document measurements1.xsd. A XML declaration should be the first line. This should list version 1.0 and an encoding of UTF-8 The XML Schema Namespace should use "http://www.w3.org/2001/XMLSchema" in its declara ...

1 which cache design is better for each of these benchmarks

1. Which cache design is better for each of these benchmarks? Use data to support your conclusion. 2. Shared cache latency increases with the CMP size. Choose the best design if the shared cache latency doubles. Off -chi ...

Spreadsheet assignmentmusic analysisuse the web to locate

Spreadsheet Assignment Music Analysis Use the web to locate information on trends CD sales versus music downloads on the Internet. You can use any of the websites you are familiar with or that have been presented in the ...

1 list and describe the four basic conversion strategies as

1. List and describe the four basic conversion strategies (as described in the chapter) that are used when converting to a new system. Under which circumstances is each of these the best approach? 2. What is technology g ...

Consider the trace-based approach to anomaly-based

Consider the trace-based approach to anomaly-based intrusion detection. An intrusion detection analyst reports that a particular pattern of system usage results in processes with "low entropy," meaning that there is litt ...

In a tcp connection the initial sequence number at the

In a TCP connection, the initial sequence number at the client site is 2171. The client opens the connection, sends three segments, the second of which carries 1000 bytes of data, and closes the connection. What is the v ...

Using a small array less than 20 elements compare the

Using a small array (less than 20 elements), compare the sorting times between the insertion sort and QuickSort. What is the difference in time? Can you explain why this difference occurs?

Assume the http client in the previous problem closes the

Assume the HTTP client in the previous problem closes the connection and, at the same time, acknowledges the bytes received in the response from the server. After receiving the FIN segment from the client, the server als ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro