0% found this document useful (0 votes)
7 views

Notes on Fading Properties of SPread spectrum

Communication system Notes for Spread Sprecturm

Uploaded by

apoorobot21
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Notes on Fading Properties of SPread spectrum

Communication system Notes for Spread Sprecturm

Uploaded by

apoorobot21
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Spread-Spectrum Modulation

1
Modulation schemes studied thus far
• Efficient use of BW and Power. Trade off BW and Power. (Bandlimited
and Power limited Modulation Schemes)
• Margins provided for operation in AWGN environment
• ISI was controlled using pulse shaping
• No margins for interference from external sources was provided.

 Both AWGN and Interference are undesired and present together.


 ISI is self interference .
 Interference from other sources are intentional and unintentional.
Need modulation schemes that facilitate reception in the presence of
AWGN plus an interference environment that are defined as.
• Unintentional interference (multiple users)
• Intentional interference (hostile jammer)
• Low probability of interception (intended overhearing, signal below
noise bed like in deep space communication )

Spread Spectrum (SS)


• Controls BW and Power independently to manage interference. (Not a
trade off as done earlier. Eb=(A.A) . T for given BW=1/T)
• Transmit data rate occupies BW in excess of minimum bandwidth.
Spreading of spectrum done by a code that is independent of information
data sequence. (Unlike say PCM where BW increase is accomplished by
code that is dependent on level)
3
4
Figure 7.5
Idealized model of baseband spread-spectrum
system. (a) Transmitter. (b) Channel. (c) Receiver.

5
Figure 7.6
Illustrating the
waveforms in the
transmitter of
Figure 7.5a.

6
Two types of SS -
•Direct Sequence SS (DSSS) wherein a Pseudo Random (PN) data
sequence is used to spread the BW of the information sequence.
• Frequency Hopped SS (FHSS) wherein the information sequence
BW is frequency hopped across much wider SS BW.

Note:
• Both employ a spreading sequence generation called PN sequence.
• The PN sequence employed has good ACF and CCF properties that
make them suitable for multipath rejection and Ranging.
• DSSS is easily employed for multiuser applications.
• FHSS is more ideally suited for Antijam applications.

7
Data DSSS Bandwidth of FHSS Bandwidth of
Data Data
BW wideband carrier BW BW wideband carrier

8
PN sequences for Spread Spectrum

Feedback shift register. (Non systematic, Feedback)

All zero initial state is not valid. Always initialized to a non zero state.

Feedback , Feedforward
Systematic , Non- Systematic 9
Maximal-length sequence, Feedback and Non-systematic
Maximal-length sequence generator for m  3.

Succession of states 100, 110, 111, 011, 101, 010, 001, 100

Output sequence 00111010 repeats itself (2^m -1 = 7)


10
11
Two different configurations of feedback shift register of length m  5. (a)
Feedback connections [5, 2].

In DS SS – Output sequence chips the information bits.

In FH SS – Two ways
1. The sequence is partitioned into k bit segments and each
segment determines hop frequency
2. Every state of Shift register determines a frequency that 12
corresponds to one output bit of sequence
Properties of Maximal Length Sequences (Used when we derive SNR)

• Period of Maximal length sequence is (2^m -1) for m- length register

•Each period of maximal length sequence has a balance property –


number of 1’s is one more than number of 0’s.

• Run property – subsequence of identical symbols (1’s or 0’s). One half


the lengths 1’s and 0’s are of length one , one fourth are of length two
etc. The total number of runs (N+1)/2 with N = 2^m -1

•Correlation property (Autocorrelation and Cross-Correlation)

13
Autocorrelation property (a) Waveform of maximal-length sequence
for length m  3 or period N  7. (b)
Autocorrelation function. (c) Power spectral
density. All three parts refer to the output of
the feedback shift register.

14
Maximal Linear m - sequences Autocorrelation property

15
Some Important Aspects about maximal length PN sequences
1. Vulnerability of the PN Sequence – Easy to find Tc and Tb from
spectrum analyzer. PN sequence should be long else feedback
connections may be easily determined. (Not suitable for antijam
applications)
2. Good Auto correlation properties especially for Ranging.
3. Auto correlation properties good for use in CDMA. But number of
such sequences are too limited for public cellular use.
4. Cross correlation properties not as good (see table) – Though it gets
better with longer sequence period ‘n’. Ideally PN sequences should
be mutually orthogonal so that interference adds on power basis. These
are not fully satisfied by linear m - sequences. Not used in CDMA
because of high values of Cross correlation.
5. Gold – Kasami sequences are the preferred choice in CDMA with
larger number of available sequences and significantly better cross
correlation properties than M-sequences.
Table on Pairs of m – sequences - next slide
16
17
Gold – Kasami Sequences

18
{-1, -t(m), t(m)- 2}

n = 2^5 – 1 = 31
Total number of seq = n+2
= 31+2 = 33

0 1 2 3 4 5

(1.x^0)+ (0.x^1)+(1.x^2)+(0.x^3)+(0.x^4)+(1.x^5)

(1.x^0)+ (1.x^1)+(1.x^2)+(0.x^3)+(1.x^4)+(1.x^5)

19
TX and Rx Architecture for DSSS with QPSK Modulation

Information Rate at Input to Encoder is R bits/sec


R = (1/Tb) where Tb is transmission time of information bit (pulse width)
W - Channel Bandwidth, W= (1/Tc) where Tc is chip time. W>>R is a necessity.

Bandwidth Expansion Factor = (W/R) = (Tb/Tc) = Lc = N i.e number of chips per Transmitted Information bit
Encoder is a (n,k) block or a convolution coder.

Code rate Rc = (k/n) = (Tc/Tb) = (1/Lc). Therefore block length of code word n = k . Lc
In terms of Time - k information bits x bit time Tb = kTb = n coded bits x chip time Tc = nTc
How is this accomplished?

Data bits (1&0) at (1/Tb) rate – Chopped by all 1’s i.e. (n,1) block code – (1&0) at (1/Tc) rate – Modulo 2
added with PN sequence at (1/Tc) rate.

bi ai
gi

ci

Output of Mod-2 adder is (ai, bi, ci are binary logic values) ai = bi + ci


This means that ai = 1 if either bi or ci is 1, else ai = 0. In other words ai=1 when bi ≠ ci, ai =0 when bi = ci.
This Logic output ‘ai’ is BPSK modulated at a bandpass carrier ‘’ after applying a real low pass shaping pulse g(t) of
duration Tc secs. Note that ‘ai’ is expressed in polar form (2 ai – 1).
However ai shown above is in additive form
s(t − iTc) = Re −(2 ai − 1) g(t − iTc)e = Re gi(t)e
Where gi(t) = −(2 ai − 1) g(t − iTc) is the ith transmitted PSK symbol.
+g(t − iTc) for ai = 0
Note that gi(t) = is the Transmitted Symbol
−g(t − iTc)for ai = 1
Reason for this choice is evident from the explanation and truth table shown below.

This scheme is fine for Transmitter with ai shown implemented in additive form.
At the Demodulator we express s(t-iTc) and correspondingly the received signal in multiplicative form in terms of
information code words and PN sequence code words since multiplicative operations are invoked at the receiver.
This multiplicative form is easily obtained by defining a secondary set of waveform functions
ci(t) = (2 ci − 1)g(t − iTc) , for the polar form of encoded data words and
pi(t) = (2 bi − 1) p(t − iTc) , for the polar form of the impressed PN sequence where p(t) is a unit height
rectangular gating pulse of duration Tc.
Then the equivalent low pass transmit signal can be represented in polar waveform as
gi(t) = pi(t). ci(t) = (2 bi − 1)(2 ci − 1) p(t − iTc)g(t − iTc) = (2 bi − 1)(2 ci − 1) g(t − iTc)
= −(2 ai − 1) g(𝑡 − 𝑖𝑇𝑐)
Here we have used the fact that p(t – iTc) is a rectangular pulse leading to p(t – iTc) ∗ g(t – iTc) = g(t – iTc)

See table below that shows that (2bi – 1) (2ci – 1) = - (2ai -1)
This is same as the transmitted PSK signal using Mod-2 adder as evidenced by the table below.

bi ci ai = bi+ci (2ai – 1) (2bi – 1) (2ci – 1) Note (2bi – 1) (2ci – 1)


Info bit PN Seq bits Coded Seq Coded Seq = - (2ai – 1)
0 0 0 -1 -1 -1 1
0 1 1 1 -1 1 -1
1 0 1 1 1 -1 -1
1 1 0 -1 1 1 1

The received signal can now be represented in multiplicative form as


r(t) = gi(t) + z(t) = pi(t) ci(t) + z(t) = (2bi – 1) (2ci – 1) g(t – iTc) + z(t)
Where z(t) represents the interference or jamming signal apart from AWGN
In cases (a) and (c), g(t) is removed first using MF and Correlator respectively . Then the PN sequence is stripped off
by using the simple fact bit by bit multiplication of two identical PN sequences is ‘1’, i.e alternations are removed. In
mathematical terms (2 𝑏𝑖 − 1) = 1. Our final idea is to extract (2ci – 1) which contains the information.

In case (a) after the MF operation it continues to be a wideband signal


r(t) ∗ g(Tc − t) = ∫ r(𝜏) g(Tc − τ − t)dτ = ∫(2 bi − 1)(2 ci − 1) g. g ∗ dt + ∫ z(t). g ∗ (t) dt
This now is (2 𝑏𝑖 − 1)(2 𝑐𝑖 − 1) ∫ 𝑔. 𝑔∗ 𝑑𝑡 + ∫ 𝑧(𝑡). 𝑔∗ 𝑑𝑡
= 2Ec (2bi – 1)(2ci – 1) + ∫ 𝑧(𝑡). 𝑔∗ 𝑑𝑡 continues to be wideband, both signal and interference parts
This MF output is now multiplied by the same synchronized PN sequence at receiver.
yi (t) = 2Ec . (2bi – 1)(2bi – 1) (2ci – 1) + ʃ (z(t) . g*(t)). (2bi – 1) dt
= 2Ec.(2ci – 1) + ʃ (z(t) . g*(t)). (2bi – 1) dt
= Info bits (narrow band) + wideband noise. (In total this appears as a wideband signal but distinctively has a
narrow band desired information content meshed with wideband interference content. So simple narrow band
filtering can mitigate effect of noise.
Now filter yi(t) through a narrow band filter that keeps only Info bits and noise only in that narrow band. Most of
the wideband jammer noise is cut off.
We now proceed to determine the error rate performance with these types of demodulators.
Jammer Design with Spread Spectrum

Need modulation schemes that facilitate reception in the presence of AWGN


plus an interference environment that are defined as.
• Unintentional interference reception (multiple users)
• Intentional interference (hostile jammer)
• Low probability of interception (Prevent intended overhearing)

Interferences are categorized as


1. Continuous Broadband (relative to information BW) Jamming.
2. Continuous Narrowband (relative to information BW) Jamming.
3. Continuous Wave (Single Tone) Jamming.
4. Pulsed Jamming.

Study of performance in the presence of these types of Interference.


PN Sequence is used to chip the Information sequence to line rate.
The line rate data Transmit symbol Modulation is BPSK, MFSK.

20
?*'rWU 4
.o
Lffybx &, \\a\:*au,z [^R
4"*,/" ca,s<]

tl.aly,^:e
4 F* w-r,*A kT; IE /-,tuA 16 E, p**
/,I.*"J W *v* l^l<t?"-"'*-'

'rta-hnutr*e 4 *N '\a
lacear'*d

f,*' F + Nmf,L"'
vJ^tu* r lu'l :: Jia +t\os,,(.f) A+
-b

Cr(+\ * W tt"^f;: k"'il'l'^


Sz>t$\ fsl 4 V^ru*4r4\ae
l,J^ l^r er{^l q L6 uao"'-J
D
lerl a(F)
6l5la-nc*
q^,," c'"b'M*JA
Aro - h"d't'tna"*

hlQ Crwid,w + +tp 1 wLW^@)'


t. l,oil.q-La.J l,rr,l*W^c"
l
L, ko,x*;1,tu) lr,,-+af,.,^* ) MJrn4Mr,,^ hf"
3. lurr" l^Xtlfrr^^* J
h. W t,,,k4",^e
t.

.f.bMil"a"J W e
b^r$dll Wtdils4'"') s?>Gl = aJ; nlurt

lil,,t,r- l,fl tLu


-4 -rT" A+
6

E hrl J \q r+) I
-P
r talu
(re.)
J-'io,+\"4 =
ri
=Jo 3$
-^lu
= ZErt"
b-t 2ilo
r;h4-L tr.J* f ht
=
= +t^'. &E'Ja

dt, =1,laEF.cl

ra Ec .2hnn; +ec|,'\^4

\",,=o(H) =.[m]=a( Fi
Lb= n Eo Et= Eb = Kc Eu
h,rX 'll^r*, K , *

fe*s . r(W;)= a ff^ d&, Lu,

)a

TxJ P.
,l* a-[l IW - \d'stL /'L

f'l r f-
T

2. Na]^b'PbtuJ l-Rw^'p'

i"k br,rb fu+,1 [a"wm/,t" = >Ta rt l-t lA nArr *f,*A


W "

lt& ,ry;^;.el, S-^"il!!" b-,^dlfiilfh tJ | <<l'n '


,

g,rct) = d&.lo
ul
= fu h5l
l+ls ,lr^,

. wtl,-
I'L
Fl,{= I
l*
JI 16r
(+) I dn^ 4
-[0, '

hr
l>
t'"
=b Dt I
*wl,,-
16rfi)' )+

^ql,
hb, l.,t] 3, -*'1,
| '[2,+t
l'l+
{-*' =
E
fr,
fr*
tr" 4*" ok Ta 6 C{) ,\r, f l"fi-A
hi,r.o,

6t ) LEc'le

nWl-
v-*L = rr urn ee'Ic ('rt"\ 4
X, )r, j^?

h rrS *crc t.xl -**


fsw
trr |
Sra,l-
-"p,1- trx I il,
s'^rtWrN L= *T"

d4 = ,lr--rlt gL
t,u'
-9- -+ -h9rTc
kx F=
H,Tc ) 2- _;

*=
ly Ec L,)n 1w
I) s,^.' &r) at € €-
^Pl-
+ E{
tJ,r $N
.F
h! u,- hr1

t-*'= te, ,om 5, If"


= *8. l'*t lb,,t T-
,*l
)

I Ft r.Lw^- =-(
t J + L.b-loare )
8 . Tb^4 fa"'*v't"-t*

to* S"*Lil = aG^/ S(+) * = 4w,o r [u 1" J*l6;l;l


T-*u = h hs, J*t l6tr\-
tt r* 6tto1 = LecTc , n* 1-
=
1 & ["lrn 1b^ Ec Te

tw
lt
\ tl g ut- Tq"t e'T c: )=r(ffi.)
Tc =J_
t^}

?,: [-@;*\
'>t a (! L'*''I
-- S"-.n ut k
NA,Ua^{b^^a
,
+, f a,rr"rrnlX @
&, = T641-r*a-
tu"*7 f^,* = &.I, a.tu)W Bw

T---."*t* d-$nDt b-a"^x",'t;q- tu*r*,1,^,*d


ka.&,*r^rJ-s { u/. 4 +;,*r-.

\o*t* e",)",,fl { "{' 4 #,,* = 5a*


Z
It *+ , Ve aeceLvg fr* b*
l,Jrrr^ Jar*",tx Lr>'* +,*,
bJ{,^ f,ewvw*t /x oN, l. : q f t€t
\ Jo
)
4d Eb
So, Av<,,oge p''ot aUlrlU * b* q.,rn-r=frf . = 4g fo

dfr^fr &_
Ax
0.1t
Du
> o,1l
(eL,) &

W
i
lf u da"'tv- "ilt*l 4
a
Ib
{,
<0,11

hnkn- f u* ) qlfr>o"'l
)
I

kfu,
4
)" rl":tu
o

lu
M
q( 4L+
t
Rc hsm
tt\= > Jo

l.a* Tb zW h (/$r^*- A*;


Fy =- fa, /
T
la,v = fo"tJ = l" I

le
,, 1o = J"-
ln

F-ro =
y<n lr' = (a. {^i :-@.
JD jq*[* J,v R
(T* lf_,)
I,r3
------7'
K
U=
<-
t4

)av k,"^,n ,^qf [f^)


6,
KA m/W (ca)
tr-u, sy".-l + Y6w dY l'raaryrr"* >'a*rho

Jo

d&

JNp--- 4q t cq e J-'Itl

ctb,lt;( L'"Jr{* hdaw


W*n tra-" - lnutu^t 1 W
4fi*rnn,n,no A^0^4* 'kbitfr; o1 l;* &Wtu', h w,Ar*@-) Tu*Y
--'-
I ' [l,C,t-,- ut<n CDI\A A

N Wre dJ o,* W - oh-!- brcd*t Gn-, \ wn*enail ft4wrnut


of Pq* ezd..

Jna= Y = !1 fuv= ru-l


WW
tRcA^^-(n")
Jrb sr'rK: let+ca-TM = *
Yrl c,,r-r)af@)
(r"-rt tj t

6bd- sNR' {"


+-
Ina Wo*^* tr^qhy ff^^
a-w A+f*V# "il'^te'

a' Aan Porl"\\ *y


Arorrtru r'ru''te )44
Tq = Y = ,\LL / T*'t
P^N W
srcf-. (q+ c6, - j M
ks W I frvrt sNrAJ

'[o vna*^+a,; 94^!- SMR , I'^€/' + k'*'-t lA = #


@
S. !rrrn5"^r*^q
(J
fu,vlxmr^!'4

lw^',e^r^, 3*
Wd. W W, T*t
w
--=
LhofrA"or.

W* Tu 4 ^-A sN( 'L


T" vnat*W S.rB , Y,rt-"d k
fm^ vw-ana' i tv,www ,
Frequency Hopped Spread Spectrum

21
• Available channel BW is divided into a large number of
contiguous frequency slots.
• In any Transmit interval, signal occupies one or more of these
frequency slots.
• Selection of frequency slot is done Pseudo randomly using a
PN sequence
• Example 1: m- bits from a PN Seq generator can be used to
determine ( – 1) possible frequency translations.
• Example 2: – Every state of shift register array in PN
sequence generator determines a frequency slot.

Frequency Hopped Spread Spectrum


• PSK modulation used in DSSS. However in FHSS systems FSK is used because it is difficult to
maintain phase coherence of frequencies over the hop pattern over wide bandwidths.
• Multiple (≥1) bits first mapped to MFSK symbol (baseband freqs 1/Tc apart) then the contiguous
baseband (one MFSK frequency per symbol ) is hopped over spread bandwidth– Block Hopping
• Multiple bits mapped to one symbol. Multiple symbols per hop. Each Multi-symbol is hopped (non-
contiguously) across spread bandwidth i.e Independent Tone hopping. When hopped at multiple symbols
per hop - Slow frequency hopping.
• Multiple bits mapped to one symbol then symbol is hopped (non- contiguously) across spread bandwidth
i.e Independent Tone hopping. When hopped as multiple(>1)hops per symbol (i.e. hop rate > symbol
rate) - Fast frequency hopping.
• Frequency Hopping is preferred when Antijam (AJ) is needed or also in CDMA where many users share
common BW. FH is preferred over DS when it comes to synchronization . DS needs sync to a fraction of
chip interval Tc ~ = 1/W. In FH however chip interval is signal BW B « W., and so time (1/B) >> (1/W)
22
Block hopping.
Carrier is PN hopped every signaling interval
M-info bearing tones separated by 1/Tc, Tc is signal interval

M possible tones from Modulator in dispersed freq slots


m - bits from PN generator and k – bits from encoder
determine freq slots.

23
Figure 7.10
Frequency-hop
spread M-ary
frequency-shift
keying.
(a) Transmitter.
(b) Receiver.

24
Rc = Max (Rh, Rs) where
Rh – hop rate,
Rs – symbol rate.
Slow Freq hop Rc = Rs= Rbitrate / K
and note that Rs > Rh
>= 1 symbols/Hop is Slow Freq Hop
Period of PN Sequence = 2^4 - 1 = 15

Figure 7.11
Illustrating slow-frequency hopping.
(a) Full spread bandwidth frequency variation
for one complete period of the PN sequence.
(b) Partitioned PN Seq. Each part mapped to a
hop frequency.
(c) Variation of the dehopped
frequency with time.

2 bits/tone, 4 FSK
2 symbols/hop
Rc = Max (Rh, Rs) where
Rh – hop rate,
Rs – symbol rate.
Fast Freq hop Rc = Rh and that is > Rs
< 1 symbol/Hop Fast Freq Hop
Figure 7.12
Illustrating fast-frequency hopping.
(a) Variation of the transmitter frequency with
time.
(b) Variation of the dehopped frequency with
time.

PN Sequence and partioning same as used


for slow freq hopping, but each partition
carries only 0.5 symbol /hop or 2 hops /
symbol.

2 bits/tone, 4 FSK
1/2 symbol /hop or 1 bit/hop
Limitations of CDMA

• CDMA was not continued in 4G and 5G because these generations


adopted OFDM, which offers better spectral efficiency, supports
higher data rates, simplifies receiver design, and integrates
seamlessly with advanced technologies like MIMO.

• OFDM also handles interference and resource management more


effectively, meets modern use case demands, and aligns with the
global move toward unified standards.

• Additionally, OFDM reduced costs compared to CDMA’s


licensing-heavy ecosystem, making it a more suitable choice for
the future of mobile communication.

27
t_
pftv,.na-'te-- Lm a,\ flilAfv C^^yr^!.l
% FHss @

Nb^ -Cd^$/.,\X T,#k* *ntsleil,, 'B


C.*4t/rr,
lt "A

f', Sl,^o t"w^% furry e"* r-vf un )

*ry)
?.= \

;F'/r" = ; - Ybkt"tn
e2- ->(D
/>l

h/*t ),=
%
, ir AntanA l^"h 2*&* blee^rdl^'
l^^ F*t
b^k
V*n*-1 hffF,n
lF* *,%, &r. <az)^ lr*y catfuw1 ff'*
untqb t*Y lt'r 'rc{ettr-t'-
rB, A^U","'-) &i'
h"*r 3 €RnA w+6r,"ahc4^ b'*

C\^t,t ilI W
_vl, L-t
1
F
L ZKr (r"v4' --z@
.\
dL "l a :o
d_

T,--
; L .q s7*A4>
b
fo

ki
(
g_'[r'"]
it 'f:o \ Y I

L '> ca)kl 4.r, v\nt) G4^jA!'& A"**v*u1 l"'-s

h^t4Np-o^cL * O(tu*v ,Jg"' a- farrmen' kW **l a-


n^ae
4 fH:, ;; Witu-A
ba^A L^to@,a

vya*"\&n)
Y* R=r(*)= ry ) C1e{r
t'eceLw) r\i' J-^wJ 0C
'
I rru^Ub\ 1 "'1

il** Ta"'*'A'
,,rk) = L"( *f G"h)

D- -- \ r'/-
rL - ./,
-
€b 7->
-F =4

/ fErfToE'lun rD

1 -L ; ) tolp <L
Numerical problems on Spread Spectrum
Problem-1

Problem-2

Problem-3

1
lvu"*{-Y"-l frxr^Wb -Sy^€^A kfrd"/^- O

Tu-* N1" =* = r**mffM=lovs= z*de


+
(itl s [-rA = rc 'T t'4

lg = 3o *It4
fnt = )''b d'b'

C 0) *en 5; :- Cq: M! Y6-h Yd^'* = B'd'n'n


=l,o=s:+d43

6ir) erq = lA+ca-TMI -n 2+dt\

To aC),rtt*<- y. = (o*6, t*€ ?tzfl6t>z * E lo"9 d"' G*'-


To a^l^\

(.1 YA: loo-u = [./e


Eu = tt.s
Ja
slr..= Ilf , M= Elr*ur, = 1o
pv -t) t

(ii) fi: &1,9 +l = [t-t


I
Problem-4

Problem-5

2
@
@ tl hw I t6L sW'{r?ea earA}^ct }s

lSl I z z1s-l b*s


L-- 2-r\-r = A = .

fu W9? vnsA*jnhw l,,"t+h nvn oht'u'"* aa]<2h0"


' lt'
cylapwYvtt+n
),g A- (twnt+',2.1) '
W'X '<s'f&""*'^ TV

'Ttu tM
svce sktr4 L= bz16'l
Wy >ax
: ro.o bF" {'r, '
sla.A{^,ileaaAS}UA:utflaysa.+t^42.,h.dbn%+=2bol]51
lb' 6' ' eg3 rAvb'
lN*.^ w,t- '{sx,-l *
bn ?ass @

ri;) 6" rr 3X ror > 6, s, Ytotf bls


*k -L+ =
lo'

** l\d{t
@ [?)
Sl'R -l* > l*Y* = >D

sNA & I l^"f 3


=F€
Ata

deAeanw lt
ct"ry €Trtt tri{'/" ry1c,1 -tph-ox-r-*
Wffi\ 4
p --
t2- J- {Eifu.*
til b't 2w1'{
Yr&\ "'}

V,,= t* (r-P) Cr-f) i' 7P u O"0 9f


44
b*a b+ L

[ur e),*- ,ltu sNA W hr ]s w, lfunce


(i,) W o^4- W
r *kl"n" -<-
| =Yb= -.t.
/-.
e = Z.z6Kto-
lo Ld,ffi,* cy- ZzyN
Wru T lo_l t;
o
tlpry,_\tJ
*b
-a
:Lo,
,$

LR ** fkr,\ 1" -,)


17/

f"5z R Lu (rv -r) = 2'qX 106 +


fr 5

= z.Qp K rtl
T. --- J-
,o Cr*{* [rr.)-l
b=* =R* XroG ckryfs"..
Tc

to,v = rnd+ t R- -- to3 / 2ja =- lo


(i)
{^

4= Soo r-
fu'5
f-.
eb

!L: 7DfW = >oAu= [ua

K
\-
N Axto3 = t# ++3

(ir) 4x o-*l - 0.01


&h,

= 0.oBg = s" r xl" 3


w --=-;
nbi
Problem-6

Problem-7

You might also like