Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write short note on Quantization.
Quantization: This is the first step in PCM. The whole amplitude range of the modulating signal is divided in a number of standard levels termed as quantization levels at equal intervals as demonstrated in figure. These levels are, after that transmitted, in binary code. Therefore, the actual number of these standard levels is a power of two as 4, 8,16,32,64,128 and so on. For the sake of simplicity, figure demonstrates only eight levels, however practical systems use 128 levels or even higher. A new signal is generated through producing, for every sample, a voltage level equivalent to the mid-point level of the standard level wherein the sample falls. Therefore if a range of 0-4 V were divided in four 1V standard levels and the signal was sampled while this was 2.8V, the quantizer will output a voltage of 2.5 V, and hold which level till the next sampling time 2.5 V corresponds to the midpoint of the third standard level. The result in a stepped wave forms that follow, the contour of the modulating signal. This discritisation of the modulating signal is termed as Quantization. Given figure demonstrates the modulating signal m(t) and quantized signal (mq(t)) when eight standard levels are utilized. The quantized wave forms are an approximation to the original signal. The difference in between the two wave forms amounts to noise added to the signal through the quantization process. Therefore the error introduced is termed as quantizaton error.
FIG - Modulating Signal and Quantized Signal
Differentiate between non-relocatable self relocatable programs. A non-relocatable program is one which cannot be executed in any memory area other than the area starting at
What is the File-system security Most commercial servers use a powerful operating system as base that provides good methods of file-system security. Some servers require additi
How can it be achieved in designing e-cash based system? E-cash is essentially an online solution. The buyer must validate the coins by the issuer in order to get the purchase
What do you understand by E-cash? E-Cash Ecash is a cash which is showed by two models. One is the on-line form of e-cash which permits for the completion of all types of
What are the Main aspects available in all word processors - Ability to set page size and page orientation - Ability to change font size and font style (for example Arial,
How would you kill a process? The "kill" command takes the PID as one argument; this signifies which process to terminate. The PID of a process can be got using "ps" command
As in PRAM there was not any direct communication medium between processors so a different model called as interconnection networks have been considered. In the interconnection net
what is software crisis
In digital ICs, Schottky transistors are preferred over normal transistors because of their ? Ans. Lower propagation delay in digital ICs, as shottky transistors reduce
The binary equivalent of (FA) 16 is ? Ans. (FA) 16 = (11111010) 10
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd