Frequency-Shift Keying, also known as FSK is a type of digital frequency modulation. It is also often called as binary frequency shift keying or BFSK
Similar to analog FM, it is a constant-amplitude angle modulation.
This presentation will discuss the concepts behind FSK
This presentation covers:
Some basic definitions & concepts of digital communication
What is Phase Shift Keying(PSK) ?
Binary Phase Shift Keying – BPSK
BPSK transmitter & receiver
Advantages & Disadvantages of BPSK
Pi/4 – QPSK
Pi/4 – QPSK transmitter & receiver
Advantages of Pi/4- QPSK
The Quadrature Phase Shift Keying QPSK is a variation of BPSK, and it is also a Double Side Band Suppressed Carrier DSBSC modulation scheme, which sends two bits of digital information at a time, called as bigits.
Instead of the conversion of digital bits into a series of digital stream, it converts them into bit pairs. This decreases the data bit rate to half, which allows space for the other users.
QPSK (Quadrature Phase Shift Keying) is type of phase shift keying. Unlike BPSK which is a DSBCS modulation scheme with digital information for the message, QPSK is also a DSBCS modulation scheme but it sends two bits of digital information a time (without the use of another carrier frequency).
The amount of radio frequency spectrum required to transmit QPSK reliably is half that required for BPSK signals, which in turn makes room for more users on the channel.
This presentation covers:
Some basic definitions & concepts of digital communication
What is Phase Shift Keying(PSK) ?
Binary Phase Shift Keying – BPSK
BPSK transmitter & receiver
Advantages & Disadvantages of BPSK
Pi/4 – QPSK
Pi/4 – QPSK transmitter & receiver
Advantages of Pi/4- QPSK
The Quadrature Phase Shift Keying QPSK is a variation of BPSK, and it is also a Double Side Band Suppressed Carrier DSBSC modulation scheme, which sends two bits of digital information at a time, called as bigits.
Instead of the conversion of digital bits into a series of digital stream, it converts them into bit pairs. This decreases the data bit rate to half, which allows space for the other users.
QPSK (Quadrature Phase Shift Keying) is type of phase shift keying. Unlike BPSK which is a DSBCS modulation scheme with digital information for the message, QPSK is also a DSBCS modulation scheme but it sends two bits of digital information a time (without the use of another carrier frequency).
The amount of radio frequency spectrum required to transmit QPSK reliably is half that required for BPSK signals, which in turn makes room for more users on the channel.
Salient Features:
The magnitude response is nearly constant(equal to 1) at lower frequencies
There are no ripples in passband and stop band
The maximum gain occurs at Ω=0 and it is H(Ω)=1
The magnitude response is monotonically decreasing
As the order of the filter ‘N’ increases, the response of the filter is more close to the ideal response
In digital modulation, minimum-shift keying(MSK) is a type of continuous-phase frequency-shift keying that was developed in the late 1950s and 1960s.
Similar to OQPSK(Offset quadrature phase-shift keying),
Base band transmission
*Wave form representation of binary digits
*PCM, DPCM, DM, ADM systems
*Detection of signals in Gaussian noise
*Matched filter - Application of matched filter
*Error probability performance of binary signaling
*Multilevel base band transmission
*Inter symbol interference
*Eye pattern
*Companding
*A law and μ law
*Correlation receiver
Phase-shift keying (PSK) is a digital modulation scheme that conveys data by changing (modulating) the phase of a reference signal (the carrier wave). The modulation is impressed by varying the sine and cosine inputs at a precise time. It is widely used for wireless LANs, RFID and Bluetooth communication
Frequency-shift keying (FSK) is a frequency modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier signal.[1] The technology is used for communication systems such as amateur radio, caller ID and emergency broadcasts
Digital data is represented as variations in the amplitude of a carrier wave in amplitude-shift keying (ASK), a type of modulation.
In an ASK system, a symbol, representing one or more bits, is sent by transmitting a fixed-amplitude carrier wave at a fixed frequency for a specific time duration.
A simple form of ASK modulation is considered that amplitude modulates a carrier based on a direct mapping of the source data bits to the waveform symbol. The most rudimentary form of ASK is given the special name On–Off Keying (OOK) modulation.
Salient Features:
The magnitude response is nearly constant(equal to 1) at lower frequencies
There are no ripples in passband and stop band
The maximum gain occurs at Ω=0 and it is H(Ω)=1
The magnitude response is monotonically decreasing
As the order of the filter ‘N’ increases, the response of the filter is more close to the ideal response
In digital modulation, minimum-shift keying(MSK) is a type of continuous-phase frequency-shift keying that was developed in the late 1950s and 1960s.
Similar to OQPSK(Offset quadrature phase-shift keying),
Base band transmission
*Wave form representation of binary digits
*PCM, DPCM, DM, ADM systems
*Detection of signals in Gaussian noise
*Matched filter - Application of matched filter
*Error probability performance of binary signaling
*Multilevel base band transmission
*Inter symbol interference
*Eye pattern
*Companding
*A law and μ law
*Correlation receiver
Phase-shift keying (PSK) is a digital modulation scheme that conveys data by changing (modulating) the phase of a reference signal (the carrier wave). The modulation is impressed by varying the sine and cosine inputs at a precise time. It is widely used for wireless LANs, RFID and Bluetooth communication
Frequency-shift keying (FSK) is a frequency modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier signal.[1] The technology is used for communication systems such as amateur radio, caller ID and emergency broadcasts
Digital data is represented as variations in the amplitude of a carrier wave in amplitude-shift keying (ASK), a type of modulation.
In an ASK system, a symbol, representing one or more bits, is sent by transmitting a fixed-amplitude carrier wave at a fixed frequency for a specific time duration.
A simple form of ASK modulation is considered that amplitude modulates a carrier based on a direct mapping of the source data bits to the waveform symbol. The most rudimentary form of ASK is given the special name On–Off Keying (OOK) modulation.
This presentation contain each and every single information on the topic.
If you like it do follow and like my presentation.
It would be worth my efforts.
The following documents defines the different encoding schemes/Techniques.
These encoding schemes have different way to solve a problem.
The techniques are used in network and wireless devices only. Although there are many different techniques that used in other devices and network as well but i used/ mention these techniques for only network and wireless devices. These techniques are also used in mobile network. There are also many lectures for this but i uploaded only lecture 5 because i found it important to everyone.
This slide describe the techniques of digital modulation and Bandwidth Efficiency:
The first null bandwidth of M-ary PSK signals decrease as M increases while Rb is held constant.
Therefore, as the value of M increases, the bandwidth efficiency also increases.
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
A comparative study and performance analysis of different modulation
techniques which shows graphically and comparative results Channel Noise
with Bit Error Rate of ASK, FSK, PSK and QPSK.
Digital Communication System
Communication Channels
AWGN: Universal channel model
Band Limited Channel: Channel BW <Signal BW, ISI
Fading Channel: multipath waves
Basic Modulation Methods
Criteria for choosing Modulation Schemes
Power Efficiency: Required Eb/N for certain error probability over AWGN channel
Bandwidth Efficiency: no. of bits per second that can be transmitted on system bandwidth.
System Complexity: Amount of circuit involved and complexity
System Performance Parameters
Average SNR
Outage Probability: instantaneous prob. Exceed certain limit
Average BEP
Amount of Fading/severity of fading
Average Outage duration: O/P SNR fall below certain SNR
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. • Similar to the analog FM, it is a constant-amplitude angle
modulation
• The modulating signal (fm) is binary.
• Often called binary frequency shift-keying (BPSK).
FREQUENCY SHIFT-KEYING
Digital Data Modulation | Frequency Shift-Keying
2
4. • General expression for FSK
𝑉𝑓𝑠𝑘 𝑡 = 𝑉𝑐cos{2𝜋 𝑓𝑐 + 𝑣 𝑚 𝑡 𝑓𝑑 𝑡}
Such that:
𝑉𝑐 = Carrier Voltage 𝑣 𝑚 = Modulating Voltage
𝑓𝑐 = Carrier Frequency 𝑓𝑑 = Frequency Deviation
GENERAL EXPRESSIONS
Digital Data Modulation | Frequency Shift-Keying
4
5. • The modulating signal is a normalized binary waveform where:
• For logic 1, 𝑣 𝑚 = +1V
𝑉𝑓𝑠𝑘 𝑡 = 𝑉𝑐cos{2𝜋 𝑓𝑐 + 𝑓𝑑 𝑡}
• For logic 0, 𝑣 𝑚 = -1V
𝑉𝑓𝑠𝑘 𝑡 = 𝑉𝑐cos{2𝜋 𝑓𝑐 − 𝑓𝑑 𝑡}
GENERAL EXPRESSIONS
Digital Data Modulation | Frequency Shift-Keying
5
7. SPACE AND MARK FREQUENCIES
Digital Data Modulation | Frequency Shift-Keying
7
• The binary 1 has a specific
frequency called the
“mark frequency (f1)
• Likewise, binary 0 has a
specific frequency called the
“space frequency (f0)”
8. SPACE AND MARK FREQUENCIES
• The space and mark frequencies
are determined through the
modulated signal’s frequency
deviation (𝑓𝑑)
• Space frequency is -𝑓𝑑 away
from the carrier frequency (fc)
• Mark frequency is + 𝑓𝑑 away
from the carrier frequency (fc)
Digital Data Modulation | Frequency Shift-Keying
8
f1f0 fc
𝑓𝑑 𝑓𝑑
9. BIT RATE, BIT TIME AND BAUD
• Bit rate (fb): number of bits delivered or received per second.
• Has a unit of bps or bits per second
• Bit time (T): the reciprocal of bitrate
• Baud: number of times a signal changes per second
𝐵𝑎𝑢𝑑 =
𝑓𝑏
𝑁
Where: N = no. of bits per signal period/symbol | fb = bit rate
Digital Data Modulation | Frequency Shift-Keying
9
10. Digital Data Modulation | Frequency Shift-Keying
10
Graph of data
sent in 1 second.
1 division is
equivalent to a
symbol or signal
period.
Bit rate: 5 bps
Baud: 5 baud
1 1 1
0 0
1 symbol
12. FSK BIT RATE, BAUD & BANDWIDTH
• Baud: Because BFSK uses binary, N = 1
𝐵𝑎𝑢𝑑 =
𝑓𝑏
𝑁
=
𝑓𝑏
1
= 𝑓𝑏
Where: N = no. of bits per signal period | fb = bit rate
• Minimum Bandwidth:
𝐵𝑊 = 2(𝑓𝑑 + 𝑓𝑏)
Digital Data Modulation | Frequency Shift-Keying
12
13. MODULATION INDEX
• In analog frequency modulation (FM):
𝑚 =
𝑓𝑑
𝑓𝑚
Where 𝑓𝑑 = freq. deviation | 𝑓𝑚 = modulating freq.
Digital Data Modulation | Frequency Shift-Keying
13
14. FSK MODULATION INDEX
• However in FSK:
𝑚 =
∆ 𝑑
𝑓 𝑏
or ∆ 𝑑(T)
Where ∆ 𝑑 = freq. deviation between 𝑓0 and 𝑓1
𝑓𝑏 = bit rate
T = bit time: reciprocal of bitrate
Digital Data Modulation | Frequency Shift-Keying
14
16. FSK MODULATION
Digital Data Modulation | Frequency Shift-Keying
16
Oscillator 1
Oscillator 2
Digital Modulation Signal
FSK Output
1
0
17. PROBLEM
“Glitches” or Phase Discontiuities
Digital Data Modulation | Frequency Shift-Keying
17
1
0 1 10 0
Caused by:
• Arbitrarily choosing mark and
space frequencies
• Abrupt changes between signal.
18. SOLUTION
Digital Data Modulation | Frequency Shift-Keying
18
➢ Using mark and space frequencies that are coherent and are integral
multiples of the bit rate.
• Coherent FSK: A type of modulation where the mark and space
frequencies start and stop at zero crossing points.
• use less bandwidth and perform better in the presence of noise.
20. MINIMUM-SHIFT KEYING (MSK)
Digital Data Modulation | Frequency Shift-Keying
20
• An improved variation of CPFSK.
• MSK further improve spectral efficiency by using a low modulation index.
• This type of modulation generally specifies:
m = 0.5
21. GAUSSIAN FILTERED MSK (GMSK)
Digital Data Modulation | Frequency Shift-Keying
21
• An improved form of MSK.
• Gaussian low-pass filter
• removes some of the higher-level harmonics that are responsible for the added sidebands
and wider bandwidth.
• Rounds the edges of the signal lengthening the rise and fall times.
• Reduces harmonic content and decreases overall signal bandwidth.
25. AUDIO FSK
• a modulation technique by which digital data is represented by changes in
the frequency (pitch) of an audio tone, yielding an encoded signal suitable for
transmission via radio or telephone.
• A higher tone for marks (1)
• A lower tone for space(0)
Digital Data Modulation | Frequency Shift-Keying
25
26. ADVANTAGES AND DISADVANTAGES
Advantage
• It has lower probability of error (Pe).
• It provides high SNR (Signal to Noise Ratio).
• It has higher immunity to noise due to constant envelope. Hence it is robust
against variation in attenuation through channel.
• FSK transmitter and FSK receiver implementations are simple for low data
rate application.
Digital Data Modulation | Frequency Shift-Keying
26
27. ADVANTAGES AND DISADVANTAGES
Disadvantage
• It uses larger bandwidth compare to other modulation techniques such as ASK
and PSK. Hence it is not bandwidth efficient.
Digital Data Modulation | Frequency Shift-Keying
27
28. APPLICATIONS
• Caller ID on Telephone Systems
• Amateur Radio
• Early Telephone-Line Modems.
• Emergency Broadcast Systems
• Modems
Digital Data Modulation | Frequency Shift-Keying
28
29. BELL 103 AND BELL 202
• Introduced on 1965, being the first
commercial computer modem.
• Provided full-duplex service at 300 bit/s
and 300 baud over normal phone lines.
• Originating:
• Mark tone of 1270 Hz, Space ton of 1070 Hz
• Answering:
• Mark tone of 2225 Hz, Space ton of 2025 Hz
Digital Data Modulation | Frequency Shift-Keying
29
Image of AT&T’s (formerly Bell Labs) Data Phone
that utilizes the Bell 103 modem
30. BELL 202
• Introduced on 1976
• Encode and transfer data at a rate
of 1200 bits per second, half-
duplex.
• Mark tone of 1200 Hz, Space tone
of 2200 Hz
• Currently used for Caller ID systems
Digital Data Modulation | Frequency Shift-Keying
30
Image of RACAL VADIC’s modem that
utilizes the Bell 202 modem
31. • Japan has the Emergency Warning System (EWS)
• known locally as Kinkyu Keihou Housou (緊急警報放送)
• Utilizes a multiplexed digital alarm signal on the
audio carrier wave.
• Transmitted at 64 bits/s.
• Signal contains area division, and date-time along
with the start and end signals.
• Mark tone of 1024 Hz | Space tone: 640 Hz
EMERGENCY BROADCAST SYSTEM
Digital Data Modulation | Frequency Shift-Keying
31
32. • The U.S. has the Emergency Alert System (EAS)
• FSK is used as a header tone for the warning
called the “SAME” header.
• Uses alternating tones of 853 Hz and 960 Hz
EMERGENCY BROADCAST SYSTEM
Digital Data Modulation | Frequency Shift-Keying
32