摘要:
The present invention is directed to a system and method for reducing the need to perform signal clipping in a DMT transmitter. In accordance with one aspect of the invention, a method performs an inverse Fourier Transform on the input to produce a time-domain, digital value to be transmitted to a remote receiver. The method then evaluates the magnitude of the digital value to determine whether the magnitude exceeds a threshold value. Then, the method alters the input and re-performs an inverse Fourier Transform on the altered input, only if the step of evaluating the magnitude determines that the magnitude of the digital value exceeds the threshold value.
摘要:
The present invention generally relates to echo cancellation over an asymmetric transmission and receiving spectra. An apparatus is provided having a transmit path and a receive path, with an adaptive echo canceler disposed therebetween, for communicating data within a first bandwidth and a second bandwidth respectively. A first decimator is disposed between the transmit path and the echo canceler circuit and filters an incoming signal having a first sampling rate and emits a signal output at a second, reduced sampling rate. A second decimator is disposed along said receive path and filters an incoming signal and emits a signal output at a reduced sampling rate. An adder is disposed to subtract the output of the adaptive echo canceler from output of the second decimator to generate a received signal that is substantially free of echo.
摘要:
A method of encoding speech using a fixed-point processor. The method treats the signal as floating point, while operating on each sample of the signal as fixed point. The disclosed method achieves precision similar to that of conventional floating point and may be rapidly executed on a fixed point processor.
摘要:
Methods and systems are disclosed facilitate differentiated QoS service for packets within a single packet stream. For example, extended QCI values may be used to differentiate service of video packets associated with different priorities. A flexible representation of QoS requirements/parameters is disclosed where QoS may be defined as a hyperspace that is a function of base QoS parameters. A WTRU may explicitly specify and/or request desired QoS parameters. A WTRU may be configured to perform one or more of video packet separation into a plurality of video packet sub-streams, merging of the video packet sub-streams, and/or reordering of the packets included in the video packet sub-streams. Techniques may be utilized to exposing more information to a data transmission network regarding the type of video packets (and/or other packets) being transmitted.
摘要:
Two network nodes may exchange messages through a relay using physical-layer network coding combined with forward error correction coding (FEC). The relay determines a prime field order based on the channel condition and communicates the field order to the network nodes. Each network node encodes an outgoing message with linear codes over a field such as finite field of the field order, and transmits a signal carrying the encoded outgoing message. The relay receives a composite signal carrying the summation of the messages from the two network nodes. The relay decodes the composite signal and extracts a composite message with linear codes over finite field of field order, and broadcasts a signal carrying the composite message. Each network node receives the signal from the relay and extracts the message intended for it using linear subtraction over finite field of field order.
摘要:
A two-way relay wireless communication method and device may combine multiple bit steams, for one source node and two target nodes, and broadcasting a network coded combined bit sequence to reduce the number of time slots for transmission. A first device may receive a signal from the source node and a target node simultaneously in a time slot. The first device may receive subsequent signals from the source node and multiple target nodes simultaneously in successive time slots. Hierarchical modulation may be applied to the received signals. The first device may decode the received signals and generate a plurality of intermediate bit sequences (IBS)s for a broadcast transmission. The generated IBSs may be grouped according to a channel condition. A second device may be configured to receive the broadcast transmission and decode a portion of the broadcast transmission that is intended for the second device.
摘要:
Disclosed are novel substituted 2H-isoquinolin-1-one and 3H-quinazolin-4-one derivatives useful as inhibitors of Rho kinase and for treating a variety of diseases and disorders that are mediated or sustained through the activity of Rho kinase, including cardiovascular diseases, pharmaceutical compositions comprising such compounds, methods for using such compounds and processes for making such compounds.
摘要:
Derivatives of 6,7-dihydro-5H-imidazo[1,2-α]imidazole-3-carboxylic acid amide exhibit good inhibitory effect upon the interaction of CAMs and Leukointegrins and are thus useful in the treatment of inflammatory disease.
摘要:
Embodiments of the present disclosure encompasses virus-like particles, methods of making virus-like particles, including expression vectors, wherein the virus-like particles may comprise enhanced levels of capsid-bound a chimeric HN-Env polypeptide compared to VLPs derived from unmodified HIV-env polypeptides. Embodiments of the virus-like particle may have Env-specific epitopes exposed on the outer surface thereof. In one embodiment, the Env-specific epitopes exposed on the outer surface of the virus-like particle may specifically bind with an anti-HIV-Env specific antibody. Embodiments of the disclosure further includes methods of generating an antibody specific to an epitope of an HIV-Env polypeptide, comprising delivering to an animal or a human an effective amount of a suspension of virus-like particles comprising a chimeric HIV-Eny polypeptide, thereby inducing the formation of an antibody specific to an epitope of an HIV-1 eny polypeptide.
摘要:
A HRPD network access authentication method based on CAVE algorithm is proposed. An AT generates a random number “RAND” necessary for the calculation of AUTH1 by using the “Random text” included in the CHAP Challenge message. A UIM card works out the AUTH1 by using the random number “RAND” and the SSD_A in the UIM card. The AT carries the AUTH1 by the Result field of the CHAP Response message. The AN-AAA generates the random number “RAND” necessary for the calculation of AUTH2 by using the “Random text” included in the Radius Access Request message. The AN-AAA works out the AUTH2 by using the random number “RAND”. The two results AUTH1 and AUTH2 is compared. If they are just the same, the authentication on the AT passes. Otherwise, the AT is rejected to access.