FilterPy
SCPI Commands :
[SOURce<HW>]:BB:BTOoth:FILTer:FILTers
[SOURce<HW>]:BB:BTOoth:FILTer:MINDex
[SOURce<HW>]:BB:BTOoth:FILTer:MTYPe
[SOURce<HW>]:BB:BTOoth:FILTer:TYPE
- class FilterPyCls[source]
FilterPy commands group definition. 16 total commands, 3 Subgroups, 4 group commands
- get_filters() str [source]
# SCPI: [SOURce<HW>]:BB:BTOoth:FILTer:FILTers value: str = driver.source.bb.btooth.filterPy.get_filters()
No command help available
- return
filters: No help available
- get_mindex() str [source]
# SCPI: [SOURce<HW>]:BB:BTOoth:FILTer:MINDex value: str = driver.source.bb.btooth.filterPy.get_mindex()
Queries the modulation index resulting from the entered frequency deviation value.
- return
mindex: string
- get_mtype() str [source]
# SCPI: [SOURce<HW>]:BB:BTOoth:FILTer:MTYPe value: str = driver.source.bb.btooth.filterPy.get_mtype()
Queries the modulation type used for the current packet selection.
- return
mtype: string
- get_type_py() RsSmbv.enums.DmFilter [source]
# SCPI: [SOURce<HW>]:BB:BTOoth:FILTer:TYPE value: enums.DmFilter = driver.source.bb.btooth.filterPy.get_type_py()
Selects the filters used for Pi/4 DQPSK and 8DPSK modulations. This opens a selection window containing all the filters available to the instrument.
- return
type_py: RCOSine| COSine| GAUSs| LGAuss| CONE| COF705| COEQualizer| COFequalizer| C2K3x| APCO25| SPHase| RECTangle| PGAuss| LPASs| DIRac| ENPShape| EWPShape
- set_type_py(type_py: RsSmbv.enums.DmFilter) None [source]
# SCPI: [SOURce<HW>]:BB:BTOoth:FILTer:TYPE driver.source.bb.btooth.filterPy.set_type_py(type_py = enums.DmFilter.APCO25)
Selects the filters used for Pi/4 DQPSK and 8DPSK modulations. This opens a selection window containing all the filters available to the instrument.
- param type_py
RCOSine| COSine| GAUSs| LGAuss| CONE| COF705| COEQualizer| COFequalizer| C2K3x| APCO25| SPHase| RECTangle| PGAuss| LPASs| DIRac| ENPShape| EWPShape
Cloning the Group
# Create a clone of the original group, that exists independently
group2 = driver.source.bb.btooth.filterPy.clone()
Subgroups