Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Electrical & Electronics Expert

problem 1: With the help of a smith chart, compute the position and length of a short-circuited stub matching a (180 + j120) ohm load to a 300 ohm transmission line. Supposing that the load impedance remains constant, determine the SWR on the mainline when the frequency is (a) raised by 10% (b) doubled.

problem 2: What do you mean by Directional coupler? Illustrate the construction of 2-hole directional coupler.

problem 3: The input power in a two hole directional coupler is 1mW. The coupler consists of a coupling factor of 15 db and a directivity of 30 db. Compute the power in all the ports.

problem 4: A symmetric directional coupler with infinite directivity and a forward attenuation of the 20db is employed to monitor the power delivered to a load. Bolometer 1 introduces a VSWR of 2on arm 4and bolometer 2 is matched to arm3. If bolometer1 reads 8mwand bolometer2 reads 2mW, determine:

a) The amount of power dissipated in ZL
b) VSWR on arm2.

problem 5: List all the properties of ferrites which make them helpful in the construction of isolator’s and circulators.

problem 6: Why TEM waves can’t be propagated in the wave-guides?

problem 7: Why rectangular waveguides are favored over the circular waveguides in some applications?

problem 8: What do you mean by magic Tee and describe why E-H plane is named as the magic Tee?

problem 9: Compute the ratio of crossection of circular waveguide to that of a rectangular one if each is to have similar cutoff wavelength for its dominant mode.

problem 10: Describe the behavior of ferrites in the isolators and circulators.

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M97495

Have any Question? 


Related Questions in Electrical & Electronics

One of the attacks an intruder can apply to a simple cipher

One of the attacks an intruder can apply to a simple cipher like an additive cipher is called the ciphertext attack. In this type of attack, the intruder intercepts the cipher and tries to find the key and eventually the ...

An exhaust stream leaving a semiconductor fabrication plant

An exhaust stream leaving a semiconductor fabrication plant contains 4 mol % volatile organic chemical, VOC, pollutant. Twenty-five cubic meters per minute enter the bottom of a packed absorption tower and flows counterc ...

Show that the time-average value of the magnitude of the

Show that the time-average value of the magnitude of the Poynting vector given by (4.68) is one-half its peak value. For an antenna radiating a time-average power of 150 kW, find the peak value of the electric field inte ...

1 learning outcomesat the end of this project students will

1. Learning outcomes At the end of this project, students will be able to: 1) Analyze power system faults based on balance and unbalanced faults techniques. (PLO4-CTPS-C4) 2) Express power flow analysis using EMTP softwa ...

1 what is a divergence meter how does it help visualize the

1. What is a divergence meter? How does it help visualize the behavior of the divergence of a vector field? 2. Provide two examples of physical phenomena in which the divergence of a vector field is nonzero. 3. State the ...

The key in des is 56 bits assume eve the intruder tries to

The key in DES is 56 bits. Assume Eve, the intruder, tries to find the key using a brute-force attack (tries all of the keys one by one). If she can try one million keys (almost 220) in each second (using a powerful comp ...

1 assume an application program uses separate audio and

1. Assume an application program uses separate audio and video streams during an RTP session. How many SSRCs and CSRCs are used in each RTP packet? 2. Can we say UDP plus RTP is the same as TCP? 3. Why does RTP need the ...

1 what is a hertzian dipole2 discuss the time-variations of

1. What is a Hertzian dipole? 2. Discuss the time-variations of the current and charges associated with the Hertzian dipole. 3. Briefly describe the spherical coordinate system. 4. Explain why it is simpler to use the sp ...

1 assume alice needs to send a confidential signed document

1. Assume Alice needs to send a confidential signed document to 100 people. How many keys does Alice need to use to prepare 100 copies if she uses asymmetric-key confidentiality? Explain. 2. In a club with 50 members, ho ...

In the system shown in figure 753 a passive nonlinear

In the system shown in Figure 7.53, a passive nonlinear element having the indicated volt-ampere characteristic is connected to an initially charged line at t = 0. Find the voltage across the nonlinear element immediatel ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen