Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain in detail companding.
Companding: It is the process of compressing and expanding. This includes compressing the signal at the transmitter and expanding this at the receiver. The modulating signal to be transmitted is passed by an amplifier that has correctly adjusted non linear transfer characteristic, favoring minute amplitude signals. Such are the artificially large while they are quantized and therefore the effect of quantizing noise upon them is decreased. The correct amplifier relations are restored at the receiver by expander. This is desirable to agree to several standards for companding as order to realize hardware efficiencies and to permit sending and receiving with a variety of users. The most general application of companding is in voice transmission. Japan and North America have adopted a standard compression curve termed as µ law companding. The law µ companding formula is specified by
Vout = ( Vmax X In (1+ µ Vin / Vmax) / In (1+ µ ) Where
Vmax = Maximum uncompressed modulating input amplitude.
Vin = Amplitude of the input signal at particular immediate at time
µ = Parameter used to describe the amount of compression
Vout = Compressed output voltage.
FIG - Companding Curves for PCM
Types of Bus: Synchronous Bus All devices gain timing information from a common clock line. Each of these intervals constitutes a bus cycle at the time duration w
Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a
Aggregation is the relationship among the whole and a part. We can add/subtract some properties in the part (slave) side. It won't affect the entire part. Best example is Car,
What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared
The FontMetrics class is used to describe implementation-specific properties, like ascent and descent, of a Font object.
dynamic storage allocation technique
how to calculate delay for hazard?
An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlocks will ever arise is? Ans. The minimum
PRINCIPLES OF COMPOSITION The principles of composition are the way that the elements of composition are used to achieve a particular purpose. Some of the main principles of co
Q. Explain about integrated circuit? An integrated circuit is created on a thin wafer of silicon that is splitted into a matrix of small areas (size of the order of a few m.m.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd