Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Jobs
Ask a Question
i) State and prove convolution property of DFT. (8) ii) Find the inverse DFT of X(k) = {6, –1 –2j, –2, –1 + 2j}.
0
votes
128
views
asked
Jul 19
in
Hardware Systems & Electronics
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
+2
votes
1
answer
867
views
Find the net ID and host ID of the following IP Addresses? I. 114.34.2.8 II. 19.34.21.5 III. 23.67.12.1 IV. 127.23.4.0 V. 192.34.5.1
asked
Jul 13
in
Computer Networks
by
anonymous
+1
vote
1
answer
103
views
Suppose X is N(10, 1). Find (i) P[X > 10.5], (ii) P[9.5 < X < 11], (iii) x such that P[X < x] = 0.95. You will need to use Standard Normal tables?
asked
Aug 30
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
160
views
Let us find the binary equivalent of (374.26)8 and the octal equivalent of (1110100.0100111)2?
asked
Oct 12
in
Hardware Systems & Electronics
by
anonymous
0
votes
0
answers
83
views
Find the Eulerian number, (n k ) where n = 6 &k =2. List down the rows of permutation
asked
Nov 29, 2020
in
Maths & Statistics
by
(user.guest)
0
votes
0
answers
52
views
The time till failure of a part, T years, has the probability density function below and is zero elsewhere, where k is a constant. i. Sketch a graph of the failure rate against time. ii. What does the shape of this graph tell you?
asked
Sep 16
in
Software Engineering
by
anonymous
0
votes
0
answers
377
views
The analog signal is given as x(t)= 2 sin 480t + 3 sin 720t. Calculate 1) Maximum Frequency ii) Nyquist Rate iii) Sampling Theroum
asked
Mar 3
in
Others
by
anonymous
–1
vote
1
answer
743
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
263
views
Explain the following algorithms and discuss how relevant they are in developing artificial intelligence systems that solves problems in the health sector. I. K-Nearest Neighbour II. Support Vector Machine III. Naive Bayes IV. Random Forest
asked
Aug 28, 2020
in
Programming Languages & Algorithms
by
anonymous
0
votes
0
answers
686
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7
in
Computer Networks
by
anonymous
+1
vote
1
answer
114
views
By writing the parity code (even) and threefold repetition code for all possible four-bit straight binary numbers, prove that the Hamming distance in the two cases is at least 2 in the case of the parity code and 3 in the case of the repetition code.
asked
Oct 13
in
Hardware Systems & Electronics
by
anonymous
+1
vote
1
answer
131
views
Let us find the octal equivalent of (2F.C4)16 and the hex equivalent of (762.013)8
asked
Oct 12
in
Hardware Systems & Electronics
by
anonymous
+1
vote
1
answer
29
views
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
Aug 30
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
62
views
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
Aug 27
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
140
views
Let us find the binary equivalent of (17E.F6)16 and the hex equivalent of (1011001110.011011101)2.
asked
Oct 12
in
Hardware Systems & Electronics
by
anonymous
0
votes
0
answers
62
views
Let f : N → Y be a function defined as f(x) = 4x + 3, where, Y = {y ∈ N: y = 4x + 3 for some x ∈ N}. Show that f is invertible. Find the inverse.
asked
Sep 29
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
112
views
Assume an arbitrary number system having a radix of 5 and 0, 1, 2, L and M as its independent digits. Determine:
asked
Oct 12
in
Hardware Systems & Electronics
by
anonymous
+1
vote
0
answers
111
views
How to design a 4-input (A,B,C,D) digital circuit that will give its output a logic 1 only if the binary number formed at the input is between 2 and 9 (2&9 inclusive)?
asked
Nov 11
in
Hardware Systems & Electronics
by
anonymous
+1
vote
1
answer
3.8k
views
Classify the following signals according to whether they are (1) one- or multi-dimen-sional; (2) single or multichannel, (3) continuous time or discrete time, and (4) analog or digital (in amplitude)
asked
Oct 1, 2019
in
Hardware Systems & Electronics
by
anonymous
+1
vote
1
answer
390
views
State Pollack’s rule and prove that if you double the number of transistors in a processor, the chances are that you will only get a speedup of about 40 per cent.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
5.3k
views
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
138
views
A probability function is given by p(0) = 0.3164, p(1) = 0.4219, p(2) = 0.2109, p(3) = 0.0469, and p(4) = 0.0039. Find its mean and variance.
asked
Aug 30
in
Maths & Statistics
by
anonymous
0
votes
1
answer
439
views
Sketch and label the even and odd components of the signals shown in Fig. 1-24. Using Eqs. (1.5) and (1.6), the even and odd components of the signals shown in Fig. 1-24 are sketched in Fig. 1-25.
asked
Oct 28, 2020
in
Maths & Statistics
by
anonymous
+2
votes
3
answers
2.4k
views
Solve the cryptarithmetic problem in Figure 6.2 by hand, using the strategy of backtracking with forward checking and the MRV and least-constraining-value heuristics.
asked
Oct 2, 2019
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
308
views
Suppose a book-shelf has 6 mathematics texts, 3 physics texts, 4 chemistry texts, and 5 computer science texts. Find the number n of ways a student can choose: a) one of the texts. b) one of each type of text.
asked
Dec 29, 2020
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
142
views
Please mention and discuss at least eight (8) types of intellectual property rights
asked
Sep 10
in
Law for Engineers
by
anonymous
0
votes
0
answers
184
views
Compute the total delay involved for a packet of size 1000 bytes to propagate over a link of distance 3000 km, propagation speed 3.0 x 108 m/s and transmission rate 2 Mbps.
asked
May 7
in
Computer Networks
by
(user.guest)
0
votes
0
answers
191
views
Suppose, there are N number of operations that have to be performed for a transaction. Now describe, in which state the (N-1) operations will be executed and what’s the name of N th operation for that specific transaction.
asked
Dec 23, 2020
in
Database Management Systems
by
anonymous
+2
votes
1
answer
74
views
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1)?
asked
Aug 30
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
102
views
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1).
asked
Aug 27
in
Maths & Statistics
by
anonymous
0
votes
0
answers
221
views
Suppose you wish to prove that the following is true for all positive integers nby using the Principle of Mathematical Induction: 1 + 3 + 5 + ... + (2n -1) =n2(a) Write P(1)
asked
Dec 22, 2020
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
587
views
The porous catalyst pellet shown in Figure 1 has an overall radius R and a thermal conductivity k (which may be assumed constant).
asked
Oct 8, 2020
in
Maths & Statistics
by
(user.guest)
+1
vote
1
answer
221
views
A certain TTL gate has IIH =20 A, IIL =0.1 mA, IOH =0.4 mA and IOL =4 mA. Determine the input and output loading in the HIGH and LOW states in terms of UL.
asked
Oct 14
in
Hardware Systems & Electronics
by
anonymous
0
votes
0
answers
230
views
Consider the simple signal processing system shown in Fig. P1.ll. The sampling periods of the AID and DIA converters are 7 = 5 ms and 7' = 1 ms, respectively. Determine the output y,,(r) of the system. if the input is
asked
Dec 15, 2020
in
Hardware Systems & Electronics
by
anonymous
0
votes
0
answers
177
views
Consider the K-means cost function for clustering N d-dimensional data points into K clusters. Compute the optimal parameters when K = 1. Derive the optimal parameters of the model when K = N.
asked
Aug 7, 2020
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
176
views
Design a 16-to-1 multiplexer using two 8-to-1 multiplexers having an active LOW ENABLE input.
asked
Oct 14
in
Hardware Systems & Electronics
by
anonymous
+3
votes
1
answer
278
views
A process X is a normally distributed population with mean = 14 and variance 16. Determine the probability that 14 objects selected will have mean is greater than 15.2.
asked
Aug 25, 2020
in
Maths & Statistics
by
anonymous
0
votes
0
answers
445
views
A microprocessor has an on - chip 2 - way set associative cache with a total capacity of 8 kByte. Each line in cache can store sixteen 8 - bit words. It has a total addressable space of 16 MBytes. Consider the following CPU instruction: Load AB1234h,
asked
May 29
in
Computer Architecture
by
anonymous
0
votes
0
answers
245
views
What is the response of the system, y(n) = x(n-2), to the input 4 points Captionless Image
asked
Apr 27
in
Others
by
anonymous
+1
vote
1
answer
884
views
An address space uses three symbols: 0, 1, and 2 to represent addresses. If each address is made of 10 symbols, how many addresses are available in this system?
asked
Jul 3, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
287
views
Read the narrative that follows and use it to answer question 5.1 and 5.2. 5.1 Identify all the relationships/business rules. (12) 5.2 Draw a domain class diagram.
asked
Jun 6
in
Software Engineering
by
anonymous
0
votes
0
answers
327
views
TWO (2) main problem dealing with I/O devices to ensure the performance of the CPU is remaining high
asked
Feb 1
in
Computer Architecture
by
anonymous
+1
vote
1
answer
95
views
Find the average age of sailors who are of voting age (i.e., at least 18 years old) for each rating level that has at least two sailors.
asked
Sep 13
in
Database Management Systems
by
anonymous
+2
votes
1
answer
244
views
Signals will be exchanged between at the___________ of the TCP/IP Model? 1- network layer 2-data link layer 3-physical layer 4-application laye
asked
Jul 14
in
Computer Networks
by
anonymous
+1
vote
1
answer
96
views
Given that 0.04% of vehicles break down when driving through a certain tunnel find the probability of (a) no (b) at least two breakdowns in an hour when 2,000 vehicles enter the tunnel?
asked
Aug 30
in
Maths & Statistics
by
anonymous
+1
vote
0
answers
50
views
What times are messages sent considering that all nodes run the (i) Slloted Aloha (ii) Pure Aloha protocol?
asked
Nov 11
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
39
views
State The Requirements Than An Innocent Party Must Prove In Order To Succeed With A Claim For Damages?
asked
Sep 11
in
Law for Engineers
by
anonymous
+1
vote
1
answer
103
views
We will find the binary equivalent of (13.375)10.?
asked
Oct 12
in
Hardware Systems & Electronics
by
anonymous
+1
vote
1
answer
142
views
Find the decimal equivalent of the following binary numbers expressed in the 2’s complement format:
asked
Oct 12
in
Hardware Systems & Electronics
by
anonymous
0
votes
0
answers
111
views
Prove that if the number of Transistors is doubled, the increase in the performance of the processor will be in the region of 40% and discuss the relevance of this mathematical observation to multi-processor computing architecture design.
asked
Aug 26
in
Computer Architecture
by
anonymous
+2
votes
1
answer
1.7k
views
The reuse of software raises a number of copyright and intellectual property issues. If a customer pays a software contractor to develop a system, who has the right to reuse the developed code?
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...