-
公开(公告)号:US12143135B2
公开(公告)日:2024-11-12
申请号:US17768777
申请日:2019-10-22
Applicant: NOKIA SOLUTIONS AND NETWORKS OY
Inventor: Shavantha Kularatna , Ramasamy Gopalan , Yared Melese
Abstract: A method, apparatus and computer program product is disclosed. The apparatus may comprise means for providing a model for a system for mitigating unwanted effects in a received signal and a means for determining a first curve, acorr, by performing autocorrelation of the model. The apparatus may also comprise means for determining a second curve, Xcorrenv, by performing cross-correlation of the model and a received signal comprising unwanted components due to first and second sources and means for estimating first and second delays associated with respective first and second sources based on the first and second curves, acorr, Xcorrenv. The unwanted effects in the received signal may be PIM products/components, but the disclosure is not limited to PIM alone, and embodiments may be used to mitigate or compute peaks in any interfering scenario where peaks may be hidden.
-
公开(公告)号:US20230142639A1
公开(公告)日:2023-05-11
申请号:US17768777
申请日:2019-10-22
Applicant: NOKIA SOLUTIONS AND NETWORKS OY
Inventor: Shavantha Kularatna , Ramasamy Gopalan , Yared Melese
CPC classification number: H04B1/123 , H04B1/1027
Abstract: A method, apparatus and computer program product is disclosed. The apparatus may comprise means for providing a model for a system for mitigating unwanted effects in a received signal and a means for determining a first curve, acorr, by performing autocorrelation of the model. The apparatus may also comprise means for determining a second curve, Xcorrenv, by performing cross-correlation of the model and a received signal comprising unwanted components due to first and second sources and means for estimating first and second delays associated with respective first and second sources based on the first and second curves, acorr, Xcorrenv. The unwanted effects in the received signal may be PIM products/components, but the disclosure is not limited to PIM alone, and embodiments may be used to mitigate or compute peaks in any interfering scenario where peaks may be hidden.
-