摘要:
An uncontrolled spatial multiple access system and method facilitating spatial multiple access for multiple devices in a wireless local-area network (WLAN). Embodiments of the system and method increase throughput of the wireless network by facilitating concurrent encoded frame transmission. Decoding of the quasi-overlapped frames is achieved using a chain decoding technique that takes data streams (or signals) containing the quasi-overlapping encoded frames and isolates each encoded frame so that the frame can be decoded. Quasi-overlapped frames means that the frames are overlapped in the body of the frame but not at the preamble (or headers) of the frames. Embodiments of the chain decoding also use interference nullifying and interference cancellation to enable concurrent quasi-overlapping transmission. A carrier counting multiple access technique of embodiments of the system and method allow wireless networks to retain their asynchronous nature while supporting spatial multiple access and maintain backwards compatibility with the IEEE 802.11 standard.
摘要:
An uncontrolled spatial multiple access system and method facilitating spatial multiple access for multiple devices in a wireless local-area network (WLAN). Embodiments of the system and method increase throughput of the wireless network by facilitating concurrent encoded frame transmission. Decoding of the quasi-overlapped frames is achieved using a chain decoding technique that takes data streams (or signals) containing the quasi-overlapping encoded frames and isolates each encoded frame so that the frame can be decoded. Quasi-overlapped frames means that the frames are overlapped in the body of the frame but not at the preamble (or headers) of the frames. Embodiments of the chain decoding also use interference nullifying and interference cancelation to enable concurrent quasi-overlapping transmission. A carrier counting multiple access technique of embodiments of the system and method allow wireless networks to retain their asynchronous nature while supporting spatial multiple access and maintain backwards compatibility with the IEEE 802.11 standard.
摘要:
An extensive use of look-up table (LUT) and single instruction multiple data (SIMD) in different algorithms in a software-defined radio (SDR) system is described. In particular, the LUT is used during spreading modulation, mapping and spreading, scrambling, de-scrambling, soft demapping, and the like. The SIMD is executed by a multi-core processor during implementation of a “min” operation to find an optimal path in a Trellis diagram for a Viterbi decoder.
摘要:
An extensive use of look-up table (LUT) and single instruction multiple data (SIMD) in different algorithms in a software-defined radio (SDR) system is described. In particular, the LUT is used during spreading modulation, mapping and spreading, scrambling, de-scrambling, soft demapping, and the like. The SIMD is executed by a multi-core processor during implementation of a “min” operation to find an optimal path in a Trellis diagram for a Viterbi decoder.
摘要:
The present application discloses a pillow, the pillow includes a pillow body; a first raised portion disposed on a first side of the pillow body and having a first raised height so as to support a neck of a human body in a supine position; and a second raised portion disposed on a side of the pillow body and having a second raised height so as to support the neck of the human body in a lateral position; wherein the first height is less than the second height. In the present application, the first side of the pillow body is provided with raised portions with different positions, which can meet the different requirements of heights of the pillow of human body in different sleeping positions, the structure is simple, and is helpful for human head to relax and improve sleep quality.
摘要:
Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a constraint that can only be satisfied by predefined readings that may be output by at least one sensor on a mobile computing device. If the sensor on the mobile computing device outputs a reading that satisfies the sensor-based constraint, secret data is provided to a requesting application. Otherwise, the requesting application is prevented from accessing the secret data.
摘要:
The present disclosure provides a nucleated red blood cell simulating particle, which may be leukocytes bound to a fluorescent-staining inhibitor capable of stably binding to the nucleus or a nucleic acid in a cell so as to reduce the binding capacity of the particles to a fluorescent dye during their detection. The present disclosure also provides a method for preparing nucleated red blood cell simulating particles, including the following steps: (a) obtaining purified leukocytes; (b) suspending the leukocytes in a cell treatment solution containing a fluorescent-staining inhibitor which stably binds to the nucleus or a nucleic acid in a cell, and (c) washing the obtained product. The present disclosure also provides a hematology control mixture containing the nucleated red blood cell simulating particles. In addition, the present disclosure describes the use of the nucleated red blood cell simulating particles and the hematology control mixtures comprising the same, for the quality control of a blood cell analyzer.
摘要:
A system and method for rehome sequencing optimization of a telecommunications network. In a preferred embodiment, a practicable optimized rehome sequencing plan is determined for a rehome plan in order to migrate the network topology from an initial state to a final state while minimizing the costs incurred during the network state transitions across multiple time periods. Constraints that may be considered include specific market restrictions such as the limit on the number of network elements in a cluster, the limit on the number of clusters in a sequencing step, the limit on the number of sequencing steps, and the immobility limit on the network elements. Constraints also may include cost restrictions incurred during network transitions, such as individual cost limits during each network transition state and an overall cost limit of network transitions from the initial state to the final state.
摘要:
The present invention relates to an acyclic nucleoside phosphonate derivative and medical uses thereof. Specifically, the present invention relates to an acyclic nucleoside phosphonate derivative of Formula I having strong potency against viruses, such as hepatitis B virus, and low cytotoxicity, or a pharmaceutically acceptable salt, isomer, hydrate or solvate thereof, wherein R1 is H or methyl; each R2 is independently —R3 or —OR3, each R3 is independently C1-C8 alkyl, C3-C8 cycloalkyl. The present invention further relates to a process for preparing the compounds of Formula I, a pharmaceutical composition comprising the compound, and the medical uses of the compound. The acyclic nucleoside phosphonate derivative of the present invention has activity against virus such as hepatitis B virus and good in vivo behavioral traits.