DSP lab4q1 in python

This commit is contained in:
Adog64 2025-03-31 23:54:32 -04:00
parent 2230168412
commit 951c6bfad6
12 changed files with 111 additions and 0 deletions

View File

@ -0,0 +1,30 @@
---
title: BIOL01113 Pre-Lab Project 9
author: Aidan Sharpe
date: March 31st, 2025
geometry: margin=1in
---
# External
1. Sclera
2. Cornea
3. Optic nerve
4. Adipose (fat)
![Cow Eye External](./cow eye external.jpg)
# Front
5. Ciliary body
6. Iris
7. Pupil
8. Lens
![Cow Eye Front](./cow eye front.jpg)
# Back
9. Sclera
10. Choroid
11. Optic disc
![Cow Eye Back](./cow eye back.jpg)

Binary file not shown.

After

Width:  |  Height:  |  Size: 27 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 52 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 39 KiB

View File

@ -0,0 +1,18 @@
import numpy as np
import scipy as sp
import matplotlib.pyplot as plt
def main():
N = 8 # Number of points
n = np.arange(0, N) # Range of inputs
x = (-1)**n # Definition of signal
X_N = sp.fft.fft(x) # DFT of signal
plt.stem(n, X_N)
plt.show()
if __name__ == "__main__":
main()

View File

@ -0,0 +1,11 @@
import numpy as np
import scipy as sp
import matplotlib.pyplot as plt
def main():
if __name__ == "__main__":
main()

View File

@ -0,0 +1,16 @@
---
title: ECE09488 Chapter 7 Questions
author: Aidan Sharpe
date: April 3rd, 2025
---
1. d
2. c
3. c
4. b
5. d
6. c
7. a
8. d
9. b
10. a

View File

@ -0,0 +1,36 @@
---
title: ECE09488 Chapter 7 Questions
author: Aidan Sharpe
date: April 3rd, 2025
geometry: margin=1in
---
### 1. Which of the following employees will most likely need a privileged user account?
d. A technician who helps users reset passwords
### 2. Which part of AAA lets you perform the creation of an EC2 instance?
c. Authorization
### 3. When signing an electronic document, what secret must you keep?
c. Your private key
### 4. Which of the following combinations is MFA?
b. Fingerprint and password
### 5. When Lisa needs access to make edits to the tables in a database, her boss gives her user account the same role as he has. What tenet of IAM security has been comprimised?
d. Least privilege
### 6. Which key is used to decrypt information contained within a server's digital certificate?
c. The client's private key
### 7. Which access control method is controlled by individual users?
a. DAC
### 8. Which technology ensures a cluster of servers can handle incoming requests without having to track individual conversations?
d. REST
### 9. Haphazardly adding permissions every time someone needs to do a new task causes increased
b. privilege creep
### 10. Which standard supports SSO?
a. SAML