Explain function of dual slope analogue to digital converter, Computer Engineering

Assignment Help:

Draw and explain the function of dual slope analogue to digital converter. Derive the equations used.

Ans.              

Dual slope A/D converter: This has 4 main blocks.

a. An integrator

b. A Comparator

c. A binary counter

d. A switch driver

The conversion process at T=0 along with switch S1 in position 0. It connects the analogue voltage Va to the input of the integrator. Therefore the output of the integrator will be as

1435_dual slope analogue to digital converter.png

It results in high Vc. It enables the AND Gate and the clock pulse reaches the ck input of the counter, that was firstly clear. The counter counts from 00......00 to 11.....11 while 2n -1 clock pulses are applied. At the subsequent clock pulse 2n the counter is cleared and Q will be 1. It controls the state of S1 that now moves to position 1 at T1, thus connecting -VR to the input of the integrator. Here the output of the integrator starts to shift in the positive direction. The counter carries on counting until V0 is less than 0. Immediately V0 goes positive at T2, VC goes LOW disabling the AND Gate.

308_N bit binary operator.png

254_Wave form of dual slope AD convertor.png

Wave form of dual slope A/D convertor

The time T1 is specified by

T1 = 2N TC, here T1 is time period of clock pulse.

Once the switch S1 is in position 1, the output voltage of the integrator is specified by

V0 = - (Va/ τ) T1 + (VR/ τ)(t - T1)

V0 = 0 at t = T2

Thus, T2 - T1  = (Va/ VR) T1 = (Va/ VR)2N TC

Assume that the count recorded in the counter be n at T2 thus T2 - T1 = n TC =(Va/ VR)2N TC

That gives n = (Va/ VR)2N


Related Discussions:- Explain function of dual slope analogue to digital converter

What are the role of an operating system, What are the role of an operating...

What are the role of an operating system? Sharing the Processor Virtual Machine: Resource management: Memory Management

Define the term internet, Internet:  The Internet, an umbrella term cov...

Internet:  The Internet, an umbrella term cover countless network and services that comprise a super-network, is a global network of computer networks that was started in the 1

What are the limitations of mobile devices, What are the limitations of mob...

What are the limitations of mobile devices? For mobile devices we require both PC-integrated applications and specialized mobile services quite than repurposed website content.

Explain naming convention libraries, Explanation:- Common used functions...

Explanation:- Common used functions are placed in libraries. These are located in the SQABas32 subdirectory of the Robot working directory. A library is separated into three fil

Synchronization latency problem, Synchronization Latency Problem:  If two s...

Synchronization Latency Problem:  If two simultaneous processes are performing remote loading, then it is not recognized by what time two processes will load, as the issuing proces

What is loadrunner, LoadRunner works by making virtual users who take the p...

LoadRunner works by making virtual users who take the place of real users operating client software, such as sending requests using the HTTP protocol to IIS or Apache web servers.

What is set screen, SET SCREEN With SET SCREEN the present screen simpl...

SET SCREEN With SET SCREEN the present screen simply specifies the next screen in the chain , control branches to this next screen  as soon as the current screen has been proce

Which device consume minimum power, Which device consume minimum power ? ...

Which device consume minimum power ? Ans. Minimum power consume by CMOS as in its one p-MOS and one n-MOS transistors are connected in complimentary mode, so one device is ON a

Building is into our operational processes, Building IS into our operationa...

Building IS into our operational processes - Information System Although information systems are becoming increasingly prevalent they are not always the correct solution to ev

State the implementation of a security policy, State the implementation of ...

State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd