摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmissions by a first access point (e.g., a femto cell) are restricted upon detecting an access terminal in the vicinity of the first access point in the event the access terminal is communicating with a second access point (e.g., a macro cell). Upon detection of such an access terminal, the access terminal restricts transmission (e.g., beacon transmission) on a downlink carrier frequency on which the access terminal is actively receiving information from the second access point. This restriction of transmission by the access point may involve, for example, temporarily reducing transmit power, reducing the periodicity of transmission, or ceasing transmission.
摘要:
Transmissions by a first access point (e.g., a femto cell) are restricted upon detecting an access terminal in the vicinity of the first access point in the event the access terminal is communicating with a second access point (e.g., a macro cell). Upon detection of such an access terminal, the access terminal restricts transmission (e.g., beacon transmission) on a downlink carrier frequency on which the access terminal is actively receiving information from the second access point. This restriction of transmission by the access point may involve, for example, temporarily reducing transmit power, reducing the periodicity of transmission, or ceasing transmission.
摘要:
Components, methods, and apparatuses are provided for determining activity likelihood function values for an activity classification for two or more past epochs based, at least in part, on signals from one or more sensors of a mobile device. A method may comprise, for each of a plurality of activity classifications, determining activity likelihood function values for each of the plurality of activity classifications for two or more past epochs. The activity likelihood function values may be based on signals from one or more sensors of a mobile device. The method may also include combining the activity likelihood function values to determine a likelihood function for an activity classification at a present epoch. The method may also include inferring a present activity of a user co-located with the mobile device to be one of the activity classifications based on the determined likelihood functions for the activity classifications at the present epoch.
摘要:
Components, methods, and apparatuses are provided for determining activity likelihood function values for an activity classification for two or more past epochs based, at least in part, on signals from one or more sensors of a mobile device. A method may comprise, for each of a plurality of activity classifications, determining activity likelihood function values for each of the plurality of activity classifications for two or more past epochs. The activity likelihood function values may be based on signals from one or more sensors of a mobile device. The method may also include combining the activity likelihood function values to determine a likelihood function for an activity classification at a present epoch. The method may also include inferring a present activity of a user co-located with the mobile device to be one of the activity classifications based on the determined likelihood functions for the activity classifications at the present epoch.
摘要:
Components, methods, and apparatuses are provided that may be used to obtain a plurality of time-referenced features extracted from signals received from one or more inertial sensors of a mobile device, wherein the time-referenced features are provided according to heterogeneous time scales. The time-referenced features are combined over a decision window to infer an activity of a user co-located with the mobile device.
摘要:
Components, methods, and apparatuses are provided that may be used to obtain a plurality of time-referenced features extracted from signals received from one or more inertial sensors of a mobile device, wherein the time-referenced features are provided according to heterogeneous time scales. The time-referenced features are combined over a decision window to infer an activity of a user co-located with the mobile device.