Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain in detail companding.
Companding: It is the process of compressing and expanding. This includes compressing the signal at the transmitter and expanding this at the receiver. The modulating signal to be transmitted is passed by an amplifier that has correctly adjusted non linear transfer characteristic, favoring minute amplitude signals. Such are the artificially large while they are quantized and therefore the effect of quantizing noise upon them is decreased. The correct amplifier relations are restored at the receiver by expander. This is desirable to agree to several standards for companding as order to realize hardware efficiencies and to permit sending and receiving with a variety of users. The most general application of companding is in voice transmission. Japan and North America have adopted a standard compression curve termed as µ law companding. The law µ companding formula is specified by
Vout = ( Vmax X In (1+ µ Vin / Vmax) / In (1+ µ ) Where
Vmax = Maximum uncompressed modulating input amplitude.
Vin = Amplitude of the input signal at particular immediate at time
µ = Parameter used to describe the amount of compression
Vout = Compressed output voltage.
FIG - Companding Curves for PCM
Java bean is a reusable component, where as the servlet is the java program which extends the server capability.
What are the essential elements of Electronic Data Interchange. The necessary elements of Electronic Data Interchange (EDI) are: The use of an electronic transmission me
The addressing specially used by Transport Layer is? The addressing particularly used through transport layer is application port address.
how to implement a modified distribution method using c/c++
What is sensitivity list? A list of signals which trigger execution of the block when they change value. Sensitivity list indicates that when a change occurs to any one of
Q. Fundamental differences between RISC and CISC architecture? Fundamental differences between RISC and CISC architecture. The following table lists following differences:
#quinhydrone
How many address bits are required to represent 4K memory ? Ans. 12 address bits are required for representing 4K memory, as 4K = 2 2 x 2 10 = 2 12 Therefore 1K = 1024
The enableEvents() method is used to enable an event for a certain object. Normally, an event is enabled when a listener is added to an object for a certain event. The enableEvents
What is dispatch unit? A separate unit which we call the dispatch unit fetch instructions from the front of the queue and sends them to the execution unit. The dispatch unit al
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd