Abstract:
A system implementing a method for determining QoS degradations comprises: receiving alarms (a) from application layer or from network nodes of a MPLS network, including Passive Traffic Analyzer, Physical Layer Monitoring and MPLS OAM nodes, depending on the alarm, the system requests testing (d) for location and the network nodes answer back with location (e), once the fault is located, the system starts traffic restoration (h) via MPLS Signaling and receives the result (i), the system may need to consult the System Database, optionally query (b)—reply (c) step before requesting location, while query (f)—response (g) step is mandatory before restoration (h), once traffic restored, further testing by the network nodes and/or the application layer are triggered (j) by the system to ensure the correct overall QoS within the new network situation, a loop (i) of further restoration can be triggered by the system until a global stable non-degraded behavior is declared.
Abstract:
A method for generating a model of a flat object from views taken by at least two calibrated cameras, which is capable of generating two-dimensional and volumetric representations of the object, where the representations can be a depth map, a volumetric representation or a mesh representation, method including the following basic steps: calibrating at least two cameras, calculating several 3D coordinates of at least three points belonging to the same plane of the flat object, calculating the equation of the plane of the flat object, selecting at least one region representing the surface of the flat object, in at least one view provided by at least one camera, and calculating the intersection between the selected region representing the surface of the object and the equation of the plane.
Abstract:
Methods, a base station and computer programs for performing multiple access in wireless OFDM cellular systems over multipath wireless channels considering both space and frequency domains,The base station 100 comprises a large number of antennas 103 in the form of a two-dimensional array and transmits a given number of signals to a number of users 106, so that each one receives its intended signal (or set of intended signals) without interference to/from the other users 106. The base station 100 includes a scheduler in space-time-frequency dimensions 101 as well as an orthogonal space-frequency processing technique 102 for addressing the users 106. The cellular scenario is assumed where the wireless channel 105 presents significant multipath, thereby resulting in multiple signal components being received by each user 106. Orthogonality of the beams is achieved upon transmission by properly discretizing the spatial domain, while inter-user interference is avoided by exciting only those beams that result in multipath components received by one single user 106.
Abstract:
The method comprises coordinating the use of radio resources between different network elements including a macro base station and SCENs deployed in the coverage area of the macro base station, operating in FDD mode, by means of the sending of messages between part or all of the network elements through a synchronized TDD air interface, unidirectionally, by broadcasting, or bidirectionally, through dedicated channels.The system comprises: several network elements including: a macro base station operating in FDD mode; and a plurality of SCENs deployed within the coverage area of the macro base station and also operating in FDD mode; and means for coordinating the use of radio resources between different network elements by the sending of messages between part or all of the network elements through a synchronized TDD air interface.
Abstract:
The method comprising measuring by an interfered base station (BS2) the uplink interference and when said uplink interference exceeds a given threshold performing a cancellation process by: discovering and identifying a serving base station (BS1) to which an interfering user device (UE1) is wirelessly connected; requesting to the serving (BS1) the RF fingerprints of the one or more interfering user devices served thereby and using the same frequency resource blocks (RB) of said interfered (BS2); receiving the RF fingerprint of said interfering user device (UE1); consulting said received RF fingerprint in a register; selecting the RF fingerprint more similar to the received one and taking the information of level of interference associated thereto; and using said taken level of interference information for performing said cancelling of said uplink interference.
Abstract:
A method for cell reselection and cell handover in a wireless communication system.The method comprises performing a cell reselection or handover between a user equipment connected to a radio access node and a neighbor cell, said neighbor cell having a subscriber list of subscribed user equipments.Said user equipment is not in said subscriber list and the method further comprises: a. generating, said radio access node, a closed subscriber group (CSG) list containing said user equipment and at least one neighbor cell detected; b. communicating, said radio access node, said CSG list to a management entity; c. reporting, said management entity, to said at least one neighbor cell included in said CSG list an invited neighbor subscriber group list, or INSG list, containing said authorized user equipment; and d. performing said cell reselection or handover between said authorized user equipment and the neighbor cell if said authorized user equipment is included in said INSG list.
Abstract:
A method and a system for providing communication between at least one wireless client device through a connectivity to a corresponding dedicated access point, as well as locating and recognizing a plurality of neighboring access points, the method including notifying, by the dedicated access point, a predetermined absence period to a wireless client device to which the dedicated access point communicates, the dedicated access point becoming a client to a second access point during the predetermined absence period, receiving, by the dedicated access point as a client, data corresponding to a backhaul bandwidth of the at least second access point and aggregating the received backhaul data from the second access point to the dedicated access point's own backhaul data, and sending, by the dedicated access point, the aggregated backhaul bandwidth data to the wireless client device after the predetermined absence period has lapsed.
Abstract:
A system including a live streaming optimizer server for optimal distribution of live media content, and a method for implementing the system. The system including at least one user provided with a computing device requesting a live media content; and a controller located in the distribution network of a content delivery network being adapted to receive said requesting and to transmit said requested live media content to said at least one user, and a live streaming optimizer (LISTO) server located in the transport network of said content delivery network and adapted to request said live media content to an identified content delivery network end point in a certain domain and adapted to transmit said live media content to said at least one user.
Abstract:
A method and system of storing and retrieving web content in a cache hard disk memory, in which read requests and write requests are separated in two different queues, and read requests are prioritized. This way, write requests are selectively delayed to favour read operations and improve user experience.
Abstract:
Procedure for a multiple digital signatureIt comprises: i) generating, by a Trusted Third Party (T), a private key for each signer or member (F1, F2, . . . , Ft) of a group of signers (G); ii) generating, each of said signers (F1, F2, . . . , Ft), a partial signature of a document (M) using their private keys; iii) generating a multiple signature from said partial signatures; and iv) verifying said multiple signature. It further comprises generating, by the Trusted Third Party (T), a common public key for all of said signers (F1, F2, . . . , Ft) and using said common public key for performing said multiple signature verification of iv).