摘要:
In a method and system for controlling gain in an RF receiver, an RF signal is analyzed over different attack and decay windows, from which the receiver determines (1) if the signal is in an attack condition with dip values below a threshold level thus indicating a need for increasing signal gain, or (2) if the signal is in a decay condition with threshold values above a threshold level thus indicating a need for decreasing signal gain. The receiver applies attack and decay windows of different sizes and in an asynchronous manner to create a gain control scheme that is insensitive to transient effects such as channel interference and deep fading that affect the intensities of an in-band signal.
摘要:
Systems and techniques relating to wireless communications are described. A described technique includes generating a digital transmit signal, receiving a digital receive signal, storing signal samples, the signal samples including transmit samples based on the digital transmit signal and receive samples based on the digital receive signal, causing, in a predistortion training mode, the digital receive signal to be based on an amplified analog version of the digital transmit signal, where the amplified analog version is produced by a power amplifier having one or more nonlinear characteristics, determining a synchronization offset value to align the transmit samples with the receive samples, determining one or more power normalization parameter values to normalize a power of the digital receive signal with respect to the digital transmit signal, estimating predistortion parameter values, and using the predistortion parameter values to predistort digital signals to compensate for the one or more nonlinear characteristics of the power amplifier. Estimating predistortion parameter values can include using information comprising the transmit samples, the receive samples, the synchronization offset value, and the one or more power normalization parameter values.
摘要:
An example method of monitoring and measuring the line width of interconnects comprising the following steps. First, we measure an I-V profile of a sample interconnect structure to obtain a sample I-V profile. The I-V profile is comprised of leakage current measurements at two or more voltages. The sample interconnect structure is comprised of spaced lines having a line spacing. Next we compare the sample I-V profile with a reference I-V profile at a reference line spacing to determine if sample interconnect structure is not defective. If the sample I-V profile is similar to the reference I-V profile, then leakage currents for the sample interconnect structure are derived from the I-V profiles at a selected voltages. Then we calculate the line spacing of the sample interconnect structure using the sample I-V profile.
摘要:
A channel decoding method and decoder are disclosed. The decoding method is based on a Circular Viterbi Algorithm (CVA), rules out impossible initial states one by one through iterations according the received soft information sequence, and finally finds the global optimal tail-biting path. In the present invention, all impossible iterations are ruled out through multiple iterations, and only the initial state having most likelihood with the received sequence survives. The algorithm is finally convergent to an optimal tail-biting path to be output. In addition, the method also updates a metric of a maximum likelihood tail-biting path (MLTBP) or rules out impossible initial states through the obtained surviving tail-biting path, thereby effectively solving the problem that the algorithm is not convergent due to a circular trap, providing a practical optimal decoding algorithm for a tail-biting convolutional code, reducing the complexity of an existing decoding scheme, and saving the storage space.
摘要:
An example method of monitoring and measuring the line width of interconnects comprising the following steps. First, we measure an I-V profile of a sample interconnect structure to obtain a sample I-V profile. The I-V profile is comprised of leakage current measurements at two or more voltages. The sample interconnect structure is comprised of spaced lines having a line spacing. Next we compare the sample I-V profile with a reference I-V profile at a reference line spacing to determine if sample interconnect structure is not defective. If the sample I-V profile is similar to the reference I-V profile, then leakage currents for the sample interconnect structure are derived from the I-V profiles at a selected voltages. Then we calculate the line spacing of the sample interconnect structure using the sample I-V profile.
摘要:
The present invention provides for a flexural pivot that can be fitted within a cavity of an actuator. The pivot includes a first member that can be coupled to the wall defining the cavity and a second member that can be mounted to the disc drive housing component of the disc drive. At least two leaves join external surfaces of the first member to the second member.The present invention offers a flexural pivot that can be easily incorporated with rotary actuators traditionally designed for use with a ball bearing pivot cartridge. In addition, it avoids the difficulties encountered by conventional designs when trying to assemble intersecting flat springs within a cylindrical sleeve. Furthermore, in comparison with conventional flexural pivots that are located outside the actuator body, the present invention provides a compact pivot that can be mounted substantially in a cavity of the actuator body such that the center of rotation of the actuator is located nearer the center of mass.
摘要:
A channel decoding method and decoder are disclosed. The decoding method is based on a Circular Viterbi Algorithm (CVA), rules out impossible initial states one by one through iterations according the received soft information sequence, and finally finds the global optimal tail-biting path. In the present invention, all impossible iterations are ruled out through multiple iterations, and only the initial state having most likelihood with the received sequence survives. The algorithm is finally convergent to an optimal tail-biting path to be output. In addition, the method also updates a metric of a maximum likelihood tail-biting path (MLTBP) or rules out impossible initial states through the obtained surviving tail-biting path, thereby effectively solving the problem that the algorithm is not convergent due to a circular trap, providing a practical optimal decoding algorithm for a tail-biting convolutional code, reducing the complexity of an existing decoding scheme, and saving the storage space.
摘要:
Methods and systems for multiple scatter estimation in Positron Emission Tomography (PET) are provided. One method includes determining attenuation sinograms and determining a varying convolution kernel as a function of the attenuation sinograms, wherein the kernel varies in amplitude and width over a radial length of a PET imaging system. The method also includes using the varying convolution kernel to estimate multiple PET scatter.
摘要:
Methods and systems for multiple scatter estimation in Positron Emission Tomography (PET) are provided. One method includes determining attenuation sinograms and determining a varying convolution kernel as a function of the attenuation sinograms, wherein the kernel varies in amplitude and width over a radial length of a PET imaging system. The method also includes using the varying convolution kernel to estimate multiple PET scatter.