Abstract:
In one embodiment, a method for estimating the number of tags in a set of tags in a system of tags and readers. The method includes, during each of a plurality of time intervals: (i) transmitting a command requesting that each tag that receives the command determine whether to transmit a reply; and (ii) receiving, in one or more timeslots of a frame corresponding to the time interval, replies from one or more tags. The method further includes providing an estimate of the number of tags in the set of one or more tags based on (i) timeslots in each of the plurality of time intervals that are zero timeslots, i.e., timeslots having no received reply, and (ii) the total number of timeslots in each frame.
Abstract:
Wireless access to a network (2) by an isolated user (1) includes the isolated user (1) transmitting a wireless signal intended to produce interference at nodes included in a group (3, 4 and 9) of nodes, that have access to the network (2). Upon the interference being detected by a member of one of the groups, and a link established between the isolated user (1) and the member of the group, access to the network (2) is arranged for the isolated user (1). In one method* the isolated user is unlicensed and seeks access to the network via a licensed part of the wireless spectrum.
Abstract:
SMS messages are delivered to non-SMS devices (110) (e.g., wireline devices in legacy communication networks (104)). Upon receiving an incoming SMS message, a message application server (114, 122) (e.g., SMSC) can detect, based on the directory number of the destination terminal, whether the destination terminal (110) is a non-SMS device. If the destination terminal (110) is a non-SMS device, the SMSC (114, 122) initiates delivery of the SMS message according to a delivery profile appropriate to the destination device. Exemplary delivery profiles include a spoken text message format, an ISUP- compatible text format or a caller ID message format.
Abstract:
In an encryption method, an input block of data is reversibly processed to produce a string that is at least partially randomized. The randomized string is then encrypted by a block cipher. In decryption, the input block of encrypted data is first decrypted with respect to the block cipher. Then the randomization is reversed.
Abstract:
A high-speed optical modulator constructed from a number of lower speed intensity modulators integrated onto a single optical chip. It comprises a pulse carver and an interferometer, said interferometer including an input coupler, a number N of waveguidearms and an output coupler. Each of the waveguide arms exhibits a path length difference of 1/p from an adjucent arm, where P is the bitrate of the output signal, and each of the arms has an intensity modulator operating at P/N bit/s and a phase shifter.
Abstract:
An apparatus, e.g. electrical switch includes a first solid electrode (14) on a substrate (12), a polyelectrolyte layer (18) over a part of the first solid electrode (14), a second solid electrode (16) on a portion of the polyelectrolyte layer (18), and an anchoring layer (26) on the part of the first solid electrode (14). The polyelectrolyte layer (18) is either chemically bonded to the anchoring layer (26) or has a thickness of less than about 20 nanometers.
Abstract:
A reconfigurable hardware architecture, in the form of a System-on-Chip 1, includes an ASIC (19) and an embedded FPGA (18) which define static and reconfigurable parts of an IC architecture (15) respectively. Incoming Ethernet, or other format, packets are applied to a packet filter (14), which detects those packets containing reconfiguration data. The reconfiguration data is used to update the FPGA (18).
Abstract:
Methods and apparatus are described for modulating an optical signal using electroabsorption in conjunction with an optical interferometer. Phase-shift keying modulation can be achieved with lower amplitude modulator drive signals than conventional methods by splitting the signal to be modulated into multiple optical modes and interferometrically combining the modes after modulating at least one of the modes with an EAM. Using the present invention, the extinction ratio performance of ASK can be significantly improved for a given drive voltage or a desired extinction ratio can be achieved with a substantially lower drive voltage. Hence, the elecro-optic bandwidth of EAMs can be enhanced by overcoming the trade-off relationship between extinction ratio and bandwidth. Furthermore, the present invention can be used to generate other modulation formats, such as QPSK or QAM, with much lower drive voltages, thereby reducing the cost and power consum tion of the hi h-s eed drive electronics for the modulation.