This document contains an exam for a Communication Theory course, with 8 multiple choice questions covering topics such as:
1) Deriving expressions for AM waves, calculating modulation indices and power.
2) Explaining phase shift modulation, square law modulation, vestigial sideband modulation and their applications.
3) Comparing AM demodulation methods such as envelope detection and rectification.
4) Calculating frequency and phase deviations for PM and FM, explaining effects of multiple modulations.
5) Drawing circuits for FM generation and detection methods such as reactance modulation and phase discrimination.
6) Calculating signal to noise ratios for AM and FM systems and comparing transmission methods.
The
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
Make a comparative study and performance analysis of different modulation
techniques which shows graphically and comparatively results like Bandwidth,
Energy and Power Efficiency of AM, DSB-SC, SSB and SSB-SC
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
A comparative study and performance analysis of different modulation
techniques which shows graphically and comparative results Channel Noise
with Bit Error Rate of ASK, FSK, PSK and QPSK.
Paper presented at ISGT Europe in Torino, Italy in September by Ghairth Al-Juboori from the Communication Systems & Networks Research Group at the University of Bristol.
The following resources come from the 2009/10 BEng (Hons) in Digital Communications & Electronics (course number 2ELE0064) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objective of this module is to have built communication links using existing AM modulation, PSK modulation and demodulation blocks, constructed AM modulators and constructed PSK modulators using operational function blocks based on their mathematical expressions, and conducted simulations of the links and modulators, all in Simulink®.
Microwaves are Electromagnetic Waves that follow the frequency range in between of 30 MHz to 300 GHz. Using this principle, only today frequently used Microwave ovens work. this presentation covers not only the basics of Microwaves but has a detailed explanation of wave guides which act as a guide for any microwave. also frequently used terms like guided wavelength, cut-off frequency, phase velocity , etc has been explained.
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
Make a comparative study and performance analysis of different modulation
techniques which shows graphically and comparatively results like Bandwidth,
Energy and Power Efficiency of AM, DSB-SC, SSB and SSB-SC
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
A comparative study and performance analysis of different modulation
techniques which shows graphically and comparative results Channel Noise
with Bit Error Rate of ASK, FSK, PSK and QPSK.
Paper presented at ISGT Europe in Torino, Italy in September by Ghairth Al-Juboori from the Communication Systems & Networks Research Group at the University of Bristol.
The following resources come from the 2009/10 BEng (Hons) in Digital Communications & Electronics (course number 2ELE0064) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objective of this module is to have built communication links using existing AM modulation, PSK modulation and demodulation blocks, constructed AM modulators and constructed PSK modulators using operational function blocks based on their mathematical expressions, and conducted simulations of the links and modulators, all in Simulink®.
Microwaves are Electromagnetic Waves that follow the frequency range in between of 30 MHz to 300 GHz. Using this principle, only today frequently used Microwave ovens work. this presentation covers not only the basics of Microwaves but has a detailed explanation of wave guides which act as a guide for any microwave. also frequently used terms like guided wavelength, cut-off frequency, phase velocity , etc has been explained.
A waveguide is an electromagnetic feed line used in microwave communications, broadcasting, and radar installations. Waveguide consists of a rectangular or cylindrical metal tube or pipe. Waveguides are often used at microwave. There are most often used with horn antenna and dish antenna.
EE402B Radio Systems and Personal Communication Networks notesHaris Hassan
Programmes in which available:
Masters of Engineering - Electrical and Electronic
Engineering. Masters of Engineering - Electronic
Engineering and Computer Science. Master of Science -
Communication Systems and Wireless Networking.
Master of Science - Smart Telecom and Sensing
Networks. Master of Science - Photonic Integrated
Circuits, Sensors and Networks.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Monitoring Java Application Security with JDK Tools and JFR Events
C O M M U N I C A T I O N T H E O R Y J N T U M O D E L P A P E R{Www
1. www.studentyogi.com www.studentyogi.com
Code No: RR220401
Set No. 1
II B.Tech II Semester Supplimentary Examinations, Apr/May 2008
COMMUNICATION THEORY
(Electronics & Communication Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
1. (a) Derive an expression for AM wave and draw its frequency spectrum.
(b) Draw the one cycle of AM wave and calculate the modulation index of it in
terms of max and min voltages.
(c) A 500-W carrier is modulated to a depth of 80%. Calculate the total power
in the modulated wave. [6+6+4]
2. (a) Explain with the help of block diagram the phase-shift metho d of sideband
suppression.
(b) Explain the operation of square law modulator. [8+8]
3. (a) What are the non-coherent methods of AM demodulation? Explain those
clearly using suitable sketches and expressions.
(b) With neat sketches, explain about the vestigial sideband (VSB) modulation
system and mention its application(s). [9+7]
4. (a) A 500-Hz modulating voltage fed into a PM generator produces a frequency
deviation of 2.25 KHz. What is the modulation index? If the amplitude of
the modulating voltage is kept constant, but its frequency is raised to 6 KHz,
what is the new deviation?
(b) Explain the e ect of multiple frequency modulations in FM System with an
example. [8+8]
5. (a) Draw the schematic diagram for basic reactance modulator using FET and
explain how this can be used as FM generator?
(b) Explain with block diagram the Armstrong method of FM generation. [8+8]
6. Draw the practical circuit of a balanced ratio detector, and show how it is derived
from the basic circuit. Explain the improvement e ected by each of the changes.
[16]
7. Explain the SNR’s at Input and output of demodulators of DSB-SC and SSB-SC
and compare them. [16]
8. (a) What is the purpose of pre-emphasis and de-emphasis ltering? Explain the
ltering process with suitable sketches.
(b) Draw the phasor diagram of signal and noise in an angle modulated system
showing both the signal and noise components. [8+8]
2. www.studentyogi.com www.studentyogi.com
Code No: RR220401
Set No. 2
II B.Tech II Semester Supplimentary Examinations, Apr/May 2008
COMMUNICATION THEORY
(Electronics & Communication Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
1. (a) An AM transmitter radiates 8KW with carrier unmodulated and 9KW when
the carrier is sinusoidally modulated. Calculate the modulation index. If
another sine wave, corresponding to 50% modulation, is transmitted simulta-
neously, determine the total radiated power.
(b) What is Frequency Translation and discuss various methods of frequency
translation techniques. [8+8]
2. (a) Explain the modulation of VSB wave using Filter method with neat block
diagram and waveforms.
(b) What do es modulation actually do to a message and carrier? [10+6]
3. (a) Write notes on amplitude limiting in ratio detector.
(b) Describe the detection of AM with carrier using Recti er detector using neat
waveforms. What are its drawbacks compared to Envelope detector. [7+9]
4. An angle modulated signal has the form u(t) = 100 cos [2 c t + 4 sin 2000 t ]
Where c = 10 MHz.
(a) Determine the average transmitted power.
(b) Determine the peak-phase deviation.
(c) Determine the peak-frequency deviation.
(d) Is this an FM or a PM signal? Explain. [4+4+4+4]
5. A carrier 100 cos 2 1×0t volts is frequency mo dulated by a signal 5 cos 2 ×
102t volts. The mo dulation index is 0.3. The modulated wave is passed through
a band pass lter whose transfer function is:
H(f) = 0.5+0.25(f-9) when 9 f 11
= 0 otherwise
and frequency is in KHz.
The ltered signal; is passed throughout an ideal envelope detector which is followed
by an ideal low pass lter with cut o at 1.5 KHz. Find the signal power at the
output of the low pass lter. Use the following values of Bessel functions wherever
required. 0(0.3)=0.99, 1(0.3)=0.1, 2(0.3)=0.01, 3(0.3)=0.001, 4(0.3)=0.0001.
[16]
3. www.studentyogi.com www.studentyogi.com
Code No: RR220401
Set No. 2
6. Using neat circuit diagram and relevant waveforms discuss how an FM signal can
be detected using phase-discrimination metho d. What are its advantages and dis-
advantages? [16]
7. Explain the SNR’s at Input and output of demodulators of DSB-SC and SSB-SC
and compare them. [16]
8. Obtain the expression for SNR in the PM reception. [16]
4. www.studentyogi.com www.studentyogi.com
Code No: RR220401
Set No. 3
II B.Tech II Semester Supplimentary Examinations, Apr/May 2008
COMMUNICATION THEORY
(Electronics & Communication Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
1. (a) A carrier wave of frequency 12MHz and the peak value of 12V is amplitude
modulated by a 6KHz sine wave with amplitude of 6V. Determine
i. Modulation index
ii. Amplitude in each side bands
iii. Frequency spectrum
iv. Band width required.
(b) Derive an expression for DSB-SC wave, if the message is ( ) and carrier is
c cos ct. [9+7]
2. (a) How mo dulation can be achieved using non-linear characteristics of an active
device and hence show the circuit diagram of Modulator.
(b) Draw the schematic diagram of chopper type modulator. Hence, explain the
generation of DSB-SC using the Ring Modulator. [8+8]
3. (a) Write notes on amplitude limiting in ratio detector.
(b) Describe the detection of AM with carrier using Recti er detector using neat
waveforms. What are its drawbacks compared to Envelope detector. [7+9]
4. (a) De ne Modulation Index in FM. Discuss the spectra of NBFM and WBFM
for various Modulation Indices.
(b) Derive equation for FM carrier from fundamentals. Also di erentiate FM and
PM. [7+9]
5. An RC capacitive reactance modulator is used to vary the frequency of a 10-MHz
oscillator by ±100KHz. An FET whose trans-conductance varies linearly with the
gate voltage from 0 to 0.625mS, is used in conjunction with a resistance whose
value is one-tenth of the capacitive reactance used. Calculate the inductance and
capacitance of the oscillator tank circuit. [16]
6. Draw the practical circuit of a balanced ratio detector, and show how it is derived
from the basic circuit. Explain the improvement e ected by each of the changes.
[16]
7. (a) Explain the Signal-to-noise ratio (SNR) calculations for conventional AM.
(b) Derive an expression for e ect of noise on SSB AM system. [8+8]
8. Explain the e ect of random noise on the output of FM demodulator ltered with
6. www.studentyogi.com www.studentyogi.com
Code No: RR220401
Set No. 4
II B.Tech II Semester Supplimentary Examinations, Apr/May 2008
COMMUNICATION THEORY
(Electronics & Communication Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
1. (a) Explain the two methods for calculation of total modulation index, when the
carrier is modulated by more than one modulating signal.
(b) What is VSB, where it is used? Explain its advantages and disadvantages over
SSB. [8+8]
2. (a) Draw the block diagram of the square law modulator and explain its operation
with the help of waveforms.
(b) Write short notes on VSB generation. [8+8]
3. (a) Explain the principle and operation of “slope Detector”.
(b) Give the block diagram for coherent detection of DSB-SC modulated wave
and explain the operation of it. Explain the process of frequency translation.
[7+9]
4. (a) A 25-MHz carrier is modulated by a 400-Hz audio sine wave. If the carrier
voltage is 4V and the maximum deviation is 10 KHz, write the equation of
this modulated wave for
i. FM and
ii. PM.
If the modulating frequency is now changed to 2 KHz, all else remaining
constant, write a new equation for
iii. FM and
iv. PM.
(b) Explain, how the bandwidth in FM is calculated. [12+4]
5. Explain the generation of FM signals
(a) Indirect method
(b) Direct methods. [8+8]
6. Explain the phase discrimination method of detection of FM signal. Using phasor
diagrams obtain the discriminator response. What are its advantages and disad-
vantages?
16]
7. A noise signal with a power density spectrum n( ) is shown in gure 7 is trans-
mitted through an ideal band pass lter shown in gure 7 . Express the output
7. www.studentyogi.com www.studentyogi.com
Code No: RR220401
Set No. 4
Figure 7
Figure 7
8. What are the observations made from the signal to noise ratio (SNR) expressions
of FM system? Explain them in detail. What do you know about the threshold
extension in FM? [16]